Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-3459 (GCVE-0-2019-3459)
Vulnerability from cvelistv5
Published
2019-04-11 15:53
Modified
2024-08-04 19:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- information leak
Summary
A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T19:12:09.320Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20190111 Linux kernel: Bluetooth: two remote infoleaks (CVE-2019-3459, CVE-2019-3460)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://marc.info/?l=oss-security\u0026m=154721580222522\u0026w=2" }, { "name": "[linux-bluetooth] 20190110 [PATCH 1/2] Bluetooth: check message types in l2cap_get_conf_opt", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047%40kroah.com/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=1120758" }, { "name": "[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html" }, { "name": "[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html" }, { "name": "[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html" }, { "name": "[oss-security] 20190627 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/27/2" }, { "name": "[oss-security] 20190627 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/27/7" }, { "name": "[oss-security] 20190628 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/28/1" }, { "name": "[oss-security] 20190628 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2" }, { "name": "RHSA-2019:2043", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2043" }, { "name": "RHSA-2019:2029", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:2029" }, { "name": "[oss-security] 20190811 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/12/1" }, { "name": "RHSA-2019:3309", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3309" }, { "name": "RHSA-2019:3517", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:3517" }, { "name": "RHSA-2020:0740", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2020:0740" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Linux", "vendor": "Linux", "versions": [ { "status": "affected", "version": "before 5.1-rc1" }, { "status": "affected", "version": "fixed in 5.1-rc1" } ] } ], "datePublic": "2019-01-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1." } ], "problemTypes": [ { "descriptions": [ { "description": "information leak", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-11T11:06:11", "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian" }, "references": [ { "name": "[oss-security] 20190111 Linux kernel: Bluetooth: two remote infoleaks (CVE-2019-3459, CVE-2019-3460)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://marc.info/?l=oss-security\u0026m=154721580222522\u0026w=2" }, { "name": "[linux-bluetooth] 20190110 [PATCH 1/2] Bluetooth: check message types in l2cap_get_conf_opt", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047%40kroah.com/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=1120758" }, { "name": "[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html" }, { "name": "[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html" }, { "name": "[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html" }, { "name": "[oss-security] 20190627 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/27/2" }, { "name": "[oss-security] 20190627 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/27/7" }, { "name": "[oss-security] 20190628 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/28/1" }, { "name": "[oss-security] 20190628 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2" }, { "name": "RHSA-2019:2043", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2043" }, { "name": "RHSA-2019:2029", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:2029" }, { "name": "[oss-security] 20190811 Re: linux-distros membership application - Microsoft", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2019/08/12/1" }, { "name": "RHSA-2019:3309", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3309" }, { "name": "RHSA-2019:3517", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:3517" }, { "name": "RHSA-2020:0740", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2020:0740" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@debian.org", "ID": "CVE-2019-3459", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Linux", "version": { "version_data": [ { "version_value": "before 5.1-rc1" }, { "version_value": "fixed in 5.1-rc1" } ] } } ] }, "vendor_name": "Linux" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "information leak" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20190111 Linux kernel: Bluetooth: two remote infoleaks (CVE-2019-3459, CVE-2019-3460)", "refsource": "MLIST", "url": "https://marc.info/?l=oss-security\u0026m=154721580222522\u0026w=2" }, { "name": "[linux-bluetooth] 20190110 [PATCH 1/2] Bluetooth: check message types in l2cap_get_conf_opt", "refsource": "MLIST", "url": "https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047@kroah.com/" }, { "name": "https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69", "refsource": "CONFIRM", "url": "https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176" }, { "name": "https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html", "refsource": "CONFIRM", "url": "https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=1120758", "refsource": "CONFIRM", "url": "https://bugzilla.novell.com/show_bug.cgi?id=1120758" }, { "name": "[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html" }, { "name": "[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html" }, { "name": "[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html" }, { "name": "[oss-security] 20190627 Re: linux-distros membership application - Microsoft", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/06/27/2" }, { "name": "[oss-security] 20190627 Re: linux-distros membership application - Microsoft", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/06/27/7" }, { "name": "[oss-security] 20190628 Re: linux-distros membership application - Microsoft", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/06/28/1" }, { "name": "[oss-security] 20190628 Re: linux-distros membership application - Microsoft", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/06/28/2" }, { "name": "RHSA-2019:2043", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2043" }, { "name": "RHSA-2019:2029", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:2029" }, { "name": "[oss-security] 20190811 Re: linux-distros membership application - Microsoft", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2019/08/12/1" }, { "name": "RHSA-2019:3309", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3309" }, { "name": "RHSA-2019:3517", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:3517" }, { "name": "RHSA-2020:0740", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2020:0740" } ] } } } }, "cveMetadata": { "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "assignerShortName": "debian", "cveId": "CVE-2019-3459", "datePublished": "2019-04-11T15:53:35", "dateReserved": "2018-12-31T00:00:00", "dateUpdated": "2024-08-04T19:12:09.320Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-3459\",\"sourceIdentifier\":\"security@debian.org\",\"published\":\"2019-04-11T16:29:02.180\",\"lastModified\":\"2024-11-21T04:42:05.233\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.\"},{\"lang\":\"es\",\"value\":\"Se descubri\u00f3 una fuga de informaci\u00f3n de direcciones en memoria din\u00e1mica mientras se usaba L2CAP_GET_CONF_OPT en el kernel de Linux anterior a 5.1-rc1.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":3.3,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.5,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"5.1\",\"matchCriteriaId\":\"A1E6CFAF-D31D-4E5F-BB85-AC66A715BFF4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07C312A0-CD2C-4B9C-B064-6409B25C278F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93A089E2-D66E-455C-969A-3140D991BAF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D8B549B-E57B-4DFE-8A13-CAB06B5356B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92BC9265-6959-4D37-BE5E-8C45E98992F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831F0F47-3565-4763-B16F-C87B1FF2035E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E3F09B5-569F-4C58-9FCA-3C0953D107B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2B15608-BABC-4663-A58F-B74BD2D1A734\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBF9BCF3-187F-410A-96CA-9C47D3ED6924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36E85B24-30F2-42AB-9F68-8668C0FCC5E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5CB3640-F55B-4127-875A-2F52D873D179\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77C61DDC-81F3-4E2D-9CAA-17A256C85443\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6B0DA79-DF12-4418-B075-F048C9E2979A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92409A9-0D6B-4B7E-8847-1B63837D201F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5C5860E-9FEB-4259-92FD-A85911E2F99E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6897676D-53F9-45B3-B27F-7FF9A4C58D33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E28F226A-CBC7-4A32-BE58-398FA5B42481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B09ACF2D-D83F-4A86-8185-9569605D8EE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC10D919-57FD-4725-B8D2-39ECB476902F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C60FA8B1-1802-4522-A088-22171DCF7A93\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/27/2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/27/7\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/28/1\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/28/2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/08/12/1\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2029\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2043\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3309\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3517\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0740\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.novell.com/show_bug.cgi?id=1120758\",\"source\":\"security@debian.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1663176\",\"source\":\"security@debian.org\",\"tags\":[\"Issue Tracking\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69\",\"source\":\"security@debian.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047%40kroah.com/\",\"source\":\"security@debian.org\"},{\"url\":\"https://marc.info/?l=oss-security\u0026m=154721580222522\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/27/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/27/7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/28/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/06/28/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2019/08/12/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2029\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:2043\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3309\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:3517\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2020:0740\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.novell.com/show_bug.cgi?id=1120758\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1663176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mitigation\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047%40kroah.com/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://marc.info/?l=oss-security\u0026m=154721580222522\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
suse-su-2019:0785-1
Vulnerability from csaf_suse
Published
2019-03-28 10:19
Modified
2019-03-28 10:19
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 Azure kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).
- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') can cause a system lock up and a denial of service. (bnc#1123161).
- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).
- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).
- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).
- CVE-2019-7221: The KVM implementation had a Use-after-Free problem (bnc#1124732).
- CVE-2019-7222: The KVM implementation had an Information Leak (bnc#1124735).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).
- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks. (bnc#1122971).
The following non-security bugs were fixed:
- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).
- 9p: clear dangling pointers in p9stat_free (bsc#1051510).
- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).
- 9p/net: fix memory leak in p9_client_create (bsc#1051510).
- 9p/net: put a lower bound on msize (bsc#1051510).
- 9p: use inode->i_lock to protect i_size_write() under 32-bit (bsc#1051510).
- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).
- acpi/device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).
- acpi/nfit: Block function zero DSMs (bsc#1051510).
- acpi/nfit: Fix Address Range Scrub completion tracking (bsc#1124969).
- acpi/nfit: Fix bus command validation (bsc#1051510).
- acpi/nfit: Fix command-supported detection (bsc#1051510).
- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).
- acpi/nfit: Fix user-initiated ARS to be 'ARS-long' rather than 'ARS-short' (bsc#1124969).
- acpi/numa: Use correct type for printing addresses on i386-PAE (bsc#1051510).
- acpi/power: Skip duplicate power resource references in _PRx (bsc#1051510).
- acpi/video: Extend chassis-type detection with a 'Lunch Box' check (bsc#1051510).
- acpi/video: Refactor and fix dmi_is_desktop() (bsc#1051510).
- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705
- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).
- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).
- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).
- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).
- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).
- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).
- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).
- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).
- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).
- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).
- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).
- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).
- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).
- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).
- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).
- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).
- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).
- alsa: hda - Serialize codec registrations (bsc#1122944).
- alsa: hda - Use standard device registration for beep (bsc#1122944).
- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).
- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).
- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).
- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).
- altera-stapl: check for a null key before strcasecmp'ing it (bsc#1051510).
- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).
- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).
- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).
- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).
- arm64: fault: avoid send SIGBUS two times (bsc#1126393).
- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).
- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).
- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).
- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).
- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).
- arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).
- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).
- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).
- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).
- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).
- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).
- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).
- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).
- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).
- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).
- arm: pxa: avoid section mismatch warning (bsc#1051510).
- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).
- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).
- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).
- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).
- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).
- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).
- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).
- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).
- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).
- assoc_array: Fix shortcut creation (bsc#1051510).
- ata: ahci: mvebu: remove stale comment (bsc#1051510).
- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).
- ath9k: dynack: check da->enabled first in sampling routines (bsc#1051510).
- ath9k: dynack: make ewma estimation faster (bsc#1051510).
- ath9k: dynack: use authentication messages for 'late' ack (bsc#1051510).
- atm: he: fix sign-extension overflow on large shift (bsc#1051510).
- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).
- ax25: fix possible use-after-free (bsc#1051510).
- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)
- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).
- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).
- batman-adv: Force mac header to start of data on xmit (bsc#1051510).
- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).
- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).
- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).
- blk-mq: fix a hung issue when fsync (bsc#1125252).
- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).
- block: break discard submissions into the user defined size (git-fixes).
- block: cleanup __blkdev_issue_discard() (git-fixes).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).
- blockdev: Fix livelocks on loop device (bsc#1124984).
- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).
- block: do not use bio->bi_vcnt to figure out segment number (bsc#1128895).
- block: do not warn when doing fsync on read-only devices (bsc#1125252).
- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).
- block: fix infinite loop if the device loses discard capability (git-fixes).
- block/loop: Use global lock for ioctl() operation (bsc#1124974).
- block: make sure discard bio is aligned with logical block size (git-fixes).
- block: make sure writesame bio is aligned with logical block size (git-fixes).
- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).
- Bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).
- Bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).
- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).
- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).
- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).
- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).
- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).
- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282).
- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).
- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).
- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).
- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1083647).
- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).
- bpf: Fix syscall's stackmap lookup potential deadlock (bsc#1083647).
- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).
- bpf/verifier: fix verifier instability (bsc#1056787).
- bsg: allocate sense buffer if requested (bsc#1106811).
- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).
- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).
- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).
- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).
- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).
- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).
- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).
- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).
- btrfs: fix fsync after succession of renames of different files (bsc#1126481).
- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).
- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).
- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).
- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).
- btrfs: Improve btrfs_search_slot description (bsc#1126802).
- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1063638).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).
- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).
- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).
- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1063638).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).
- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).
- btrfs: remove always true check in unlock_up (bsc#1126802).
- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).
- btrfs: remove unnecessary level check in balance_level (bsc#1126802).
- btrfs: remove unused check of skip_locking (bsc#1126802).
- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).
- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).
- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).
- btrfs: split btrfs_extent_same (bsc#1127493).
- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).
- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).
- can: bcm: check timer values before ktime conversion (bsc#1051510).
- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).
- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).
- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).
- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).
- ceph: avoid repeatedly adding inode to mdsc->snap_flush_list (bsc#1126790).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).
- cfg80211: extend range deviation for DMG (bsc#1051510).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).
- checkstack.pl: fix for aarch64 (bsc#1051510).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- cifs: add missing debug entries for kconfig options (bsc#1051510).
- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510).
- cifs: add sha512 secmech (bsc#1051510).
- cifs: Add support for reading attributes on SMB2+ (bsc#1051510).
- cifs: Add support for writing attributes on SMB2+ (bsc#1051510).
- cifs: Always resolve hostname before reconnecting (bsc#1051510).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).
- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).
- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).
- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510).
- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).
- cifs: Fix NULL pointer dereference of devname (bnc#1129519).
- cifs: fix return value for cifs_listxattr (bsc#1051510).
- cifs: Fix separator when building path from dentry (bsc#1051510).
- cifs: fix set info (bsc#1051510).
- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).
- cifs: fix wrapping bugs in num_entries() (bsc#1051510).
- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: implement v3.11 preauth integrity (bsc#1051510).
- cifs: invalidate cache when we truncate a file (bsc#1051510).
- cifs: make 'nodfs' mount opt a superblock flag (bsc#1051510).
- cifs: OFD locks do not conflict with eachothers (bsc#1051510).
- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).
- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: refactor crypto shash/sdesc allocation&free (bsc#1051510).
- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).
- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).
- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).
- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).
- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).
- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).
- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).
- clk: imx6q: reset exclusive gates on init (bsc#1051510).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).
- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).
- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).
- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).
- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).
- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).
- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).
- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).
- clk: socfpga: fix refcount leak (bsc#1051510).
- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).
- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).
- clk: sunxi-ng: enable so-said LDOs for A64 SoC's pll-mipi clock (bsc#1051510).
- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).
- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).
- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).
- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).
- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).
- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).
- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).
- configfs: fix registered group removal (bsc#1051510).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).
- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).
- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).
- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).
- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).
- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).
- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).
- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).
- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).
- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).
- crypto: ahash - fix another early termination in hash walk (bsc#1051510).
- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).
- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).
- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).
- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).
- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).
- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).
- crypto: caam - fixed handling of sg list (bsc#1051510).
- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).
- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).
- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).
- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).
- crypto: hash - set CRYPTO_TFM_NEED_KEY if ->setkey() fails (bsc#1051510).
- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).
- crypto: tgr192 - fix unaligned memory access (bsc#1051510).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).
- cw1200: drop useless LIST_HEAD (bsc#1051510).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).
- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).
- debugfs: fix debugfs_rename parameter checking (bsc#1051510).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).
- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).
- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).
- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).
- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).
- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).
- dmaengine: at_hdmac: fix module unloading (bsc#1051510).
- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).
- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).
- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).
- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).
- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).
- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).
- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).
- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).
- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).
- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).
- dma: Introduce dma_max_mapping_size() (bsc#1120008).
- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).
- dm: call blk_queue_split() to impose device limits on bios (git-fixes).
- dm: do not allow readahead to limit IO size (git-fixes).
- dm thin: send event about thin-pool state change _after_ making it (git-fixes).
- dm zoned: Fix target BIO completion handling (git-fixes).
- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).
- doc/README.SUSE: Correct description for building a kernel (bsc#1123348) The obsoleted make cloneconfig is corrected. Also the order of make scripts and make prepare are corrected as well.
- Do not log confusing message on reconnect by default (bsc#1129664).
- Do not log expected error on DFS referral request (bsc#1051510).
- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).
- driver core: Move async_synchronize_full call (bsc#1051510).
- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).
- Drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).
- Drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).
- Drivers: hv: vmbus: Remove the useless API vmbus_get_outgoing_channel() (bsc#1127578).
- Drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).
- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).
- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).
- drivers/sbus/char: add of_node_put() (bsc#1051510).
- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).
- drm/ast: Fix connector leak during driver unload (bsc#1051510).
- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).
- drm/atomic-helper: Complete fake_commit->flip_done potentially earlier (bsc#1051510).
- drm: Block fb changes for async plane updates (bsc#1051510).
- drm/bridge: tc358767: add defines for DP1_SRCCTRL & PHY_2LANE (bsc#1051510).
- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).
- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).
- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).
- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).
- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).
- drm: Clear state->acquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).
- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).
- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)
- drm/etnaviv: potential NULL dereference (bsc#1113722)
- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)
- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)
- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)
- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)
- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)
- drm/i915/gvt: Fix mmap range check (bsc#1120902)
- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)
- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).
- drm/i915/opregion: fix version check (bsc#1113722)
- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)
- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).
- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)
- drm/meson: add missing of_node_put (bsc#1051510).
- drm/modes: Prevent division by zero htotal (bsc#1051510).
- drm/msm: Fix error return checking (bsc#1051510).
- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).
- drm/msm: Unblock writer if reader closes file (bsc#1051510).
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)
- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).
- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)
- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)
- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)
- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).
- drm/rockchip: fix for mailbox read size (bsc#1051510).
- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)
- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).
- drm/vmwgfx: Do not double-free the mode stored in par->set_mode (bsc#1103429)
- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)
- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)
- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).
- earlycon: Initialize port->uartclk based on clock-frequency property (bsc#1051510).
- earlycon: Remove hardcoded port->uartclk initialization in of_setup_earlycon (bsc#1051510).
- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)
- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).
- enic: fix checksum validation for IPv6 (bsc#1051510).
- esp6: fix memleak on error path in esp6_input (bsc#1051510).
- esp: Fix locking on page fragment allocation (bsc#1051510).
- esp: Fix memleaks on error paths (bsc#1051510).
- esp: Fix skb tailroom calculation (bsc#1051510).
- exportfs: do not read dentry after free (bsc#1051510).
- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).
- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).
- ext4: Fix crash during online resizing (bsc#1122779).
- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).
- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).
- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).
- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).
- fanotify: fix handling of events on child sub-directory (bsc#1122019).
- fat: validate ->i_start before using (bsc#1051510).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1113722)
- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).
- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).
- floppy: check_events callback should not return a negative number (bsc#1051510).
- fork: do not copy inconsistent signal handler state to child (bsc#1051510).
- fork: record start_time late (git-fixes).
- fork: unconditionally clear stack on fork (git-fixes).
- fs/cifs: require sha512 (bsc#1051510).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).
- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).
- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).
- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).
- fuse: handle zero sized retrieve correctly (bsc#1051510).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bsc#1051510).
- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).
- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).
- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).
- geneve, vxlan: Do not set exceptions if skb->len < mtu (bsc#1123456).
- genwqe: Fix size check (bsc#1051510).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bsc#1120601).
- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).
- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).
- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).
- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).
- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).
- gpio: pl061: handle failed allocations (bsc#1051510).
- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).
- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)
- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).
- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).
- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).
- hfs: do not free node before using (bsc#1051510).
- hfsplus: do not free node before using (bsc#1051510).
- hfsplus: prevent btree data loss on root split (bsc#1051510).
- hfs: prevent btree data loss on root split (bsc#1051510).
- HID: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).
- hpet: Fix missing '=' character in the __setup() code of hpet_mmap_enable (git-fixes).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).
- hv_uio_generic: map ringbuffer phys addr (bsc#1127578).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).
- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).
- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).
- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).
- i2c-axxia: check for error conditions first (bsc#1051510).
- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).
- i2c: cadence: Fix the hold bit setting (bsc#1051510).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).
- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).
- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).
- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).
- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).
- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).
- IB/core: Destroy QP if XRC QP fails (bsc#1046306).
- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).
- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).
- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).
- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- ide: pmac: add of_node_put() (bsc#1051510).
- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).
- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).
- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).
- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).
- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).
- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).
- input: bma150 - register input device after setting private data (bsc#1051510).
- input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).
- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).
- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).
- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).
- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).
- input: raspberrypi-ts - fix link error (git-fixes).
- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).
- input: restore EV_ABS ABS_RESERVED (bsc#1051510).
- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).
- input: synaptics - enable SMBus for HP EliteBook 840 G4 (bsc#1051510).
- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).
- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).
- intel_th: Do not reference unassigned outputs (bsc#1051510).
- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).
- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).
- iomap: warn on zero-length mappings (bsc#1127062).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).
- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).
- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).
- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).
- ipmi:pci: Blacklist a Realtek 'IPMI' device (git-fixes).
- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).
- ipsec: check return value of skb_to_sgvec always (bsc#1051510).
- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).
- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).
- ipv6: addrlabel: per netns list (bsc#1122982).
- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).
- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).
- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).
- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982).
- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).
- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).
- ip: validate header length on virtual device xmit (networking-stable-19_01_04).
- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).
- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).
- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).
- iscsi target: fix session creation failure handling (bsc#1051510).
- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).
- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).
- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).
- iser: set sector for ambiguous mr status errors (bsc#1051510).
- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).
- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).
- iwlwifi: mvm: fix RSS config command (bsc#1051510).
- iwlwifi: pcie: fix emergency path (bsc#1051510).
- iwlwifi: pcie: fix TX while flushing (bsc#1120902).
- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).
- ixgbe: check return value of napi_complete_done() (bsc#1051510).
- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).
- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).
- kABI: fix xhci kABI stability (bsc#1119086).
- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).
- kabi: handle addition of uevent_sock into struct net (bsc#1122982).
- kABI: Preserve kABI for dma_max_mapping_size() (bsc#1120008).
- kABI: protect struct sctp_association (kabi).
- kABI: protect vhost_log_write (kabi).
- kabi: restore ip_tunnel_delete_net() (bsc#1122982).
- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).
- kABI workaround for bt_accept_enqueue() change (bsc#1051510).
- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).
- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).
- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).
- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).
- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).
- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).
- KEYS: allow reaching the keys quotas exactly (bsc#1051510).
- keys: Timestamp new keys (bsc#1051510).
- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).
- kgdboc: Fix restrict error (bsc#1051510).
- kgdboc: Fix warning with module build (bsc#1051510).
- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).
- kobject: copy env blob in one go (bsc#1122982).
- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).
- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).
- KVM: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).
- KVM: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).
- KVM: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).
- KVM: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).
- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).
- KVM: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).
- KVM: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).
- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- KVM: x86: fix L1TF's MMIO GFN calculation (bsc#1124204).
- KVM: x86: Fix single-step debugging (bsc#1129295).
- KVM: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).
- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).
- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).
- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).
- lan78xx: Resolve issue with changing MAC address (bsc#1051510).
- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).
- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).
- libceph: handle an empty authorize reply (bsc#1126789).
- lib/div64.c: off by one in shift (bsc#1051510).
- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).
- libnvdimm/label: Clear 'updating' flag after label-set update (bsc#1129543).
- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).
- lib/rbtree-test: lower default params (git-fixes).
- lightnvm: fail fast on passthrough commands (bsc#1125780).
- livepatch: Change unsigned long old_addr -> void *old_func in struct klp_func (bsc#1071995).
- livepatch: Consolidate klp_free functions (bsc#1071995 ).
- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).
- livepatch: Define a macro for new API identification (bsc#1071995).
- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).
- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).
- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).
- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).
- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).
- livepatch: Remove signal sysfs attribute (bsc#1071995 ).
- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).
- livepatch: Send a fake signal periodically (bsc#1071995 ).
- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).
- livepatch: Simplify API by removing registration step (bsc#1071995).
- llc: do not use sk_eat_skb() (bsc#1051510).
- lockd: fix access beyond unterminated strings in prints (git-fixes).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: drop caches if offset or block_size are changed (bsc#1124975).
- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).
- LSM: Check for NULL cred-security on free (bsc#1051510).
- mac80211: Add attribute aligned(2) to struct 'action' (bsc#1051510).
- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).
- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).
- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).
- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).
- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).
- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).
- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).
- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).
- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).
- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).
- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).
- media: s5k4ecgx: delete a bogus error message (bsc#1051510).
- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).
- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).
- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).
- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).
- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).
- media: uvcvideo: Fix 'type' check leading to overflow (bsc#1051510).
- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).
- media: v4l2-tpg: array index could become negative (bsc#1051510).
- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).
- media: vb2: be sure to unlock mutex on errors (bsc#1051510).
- media: vb2: vb2_mmap: move lock up (bsc#1051510).
- media: vivid: fix error handling of kthread_run (bsc#1051510).
- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).
- media: vivid: set min width/height to a value > 0 (bsc#1051510).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).
- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).
- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).
- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).
- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).
- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).
- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).
- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).
- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).
- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).
- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).
- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).
- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).
- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).
- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).
- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).
- misc: sram: enable clock before registering regions (bsc#1051510).
- misc: sram: fix resource leaks in probe error path (bsc#1051510).
- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).
- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).
- mISDN: fix a race in dev_expire_timer() (bsc#1051510).
- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).
- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).
- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).
- mmap: relax file size limit for regular files (git fixes (mm/mmap)).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).
- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).
- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).
- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).
- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).
- mmc: omap: fix the maximum timeout setting (bsc#1051510).
- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).
- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).
- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).
- mmc: spi: Fix card detection during probe (bsc#1051510).
- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).
- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).
- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).
- mm/ksm.c: ignore STABLE_FLAG of rmap_item->address in rmap_walk_ksm() (git fixes (mm/ksm)).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).
- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).
- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)
- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).
- mm: migration: factor out code to compute expected number of page references (bsc#1084216).
- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).
- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).
- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).
- mpt3sas: check sense buffer before copying sense data (bsc#1106811).
- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).
- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).
- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).
- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).
- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).
- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).
- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).
- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).
- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).
- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).
- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).
- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).
- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).
- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).
- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).
- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).
- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).
- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).
- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).
- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).
- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).
- mtd: nand: ifc: update bufnum mask for ver >= 2.0.0 (bsc#1051510).
- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).
- mtd: nand: omap2: Fix subpage write (bsc#1051510).
- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).
- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).
- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).
- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).
- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).
- mtd: nand: vf610: set correct ooblayout (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).
- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).
- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).
- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).
- mv88e6060: disable hardware level MAC learning (bsc#1051510).
- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).
- neighbour: Avoid writing before skb->head in neigh_hh_output() (networking-stable-18_12_12).
- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).
- net: add uevent socket member (bsc#1122982).
- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).
- net: aquantia: fixed instack structure overflow (git-fixes).
- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).
- net: bcmgenet: abort suspend on error (bsc#1051510).
- net: bcmgenet: code movement (bsc#1051510).
- net: bcmgenet: fix OF child-node lookup (bsc#1051510).
- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).
- net: bcmgenet: return correct value 'ret' from bcmgenet_power_down (bsc#1051510).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).
- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).
- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- net: do not call update_pmtu unconditionally (bsc#1123456).
- net: Do not default Cavium PTP driver to 'y' (bsc#1110096).
- net: dp83640: expire old TX-skb (networking-stable-19_02_10).
- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).
- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).
- net: ena: fix race between link up and device initalization (bsc#1083548).
- netfilter: nf_tables: check the result of dereferencing base_chain->stats (git-fixes).
- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).
- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).
- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).
- net: hns3: add handling for big TX fragment (bsc#1104353 ).
- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).
- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).
- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).
- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).
- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).
- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).
- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).
- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).
- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).
- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).
- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).
- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).
- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).
- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).
- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).
- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).
- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Release resource on error flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).
- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).
- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).
- netns: restrict uevents (bsc#1122982).
- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).
- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).
- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).
- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).
- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).
- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).
- netrom: switch to sock timer API (bsc#1051510).
- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).
- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).
- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).
- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).
- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).
- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).
- net: stmmac: Fix PCI module removal leak (git-fixes).
- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).
- net: stmmac: Use mutex instead of spinlock (git-fixes).
- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).
- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).
- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).
- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).
- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).
- nfit: acpi_nfit_ctl(): Check out_obj->type in the right place (bsc#1129547).
- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).
- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).
- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).
- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).
- nfsd: Fix an Oops in free_session() (git-fixes).
- nfs: Fix a missed page unlock after pg_doio() (git-fixes).
- NFS: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).
- NFSv4.1: Fix the r/wsize checking (git-fixes).
- NFSv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).
- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).
- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).
- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).
- nvme: kABI fix for scan_lock (bsc#1123882).
- nvme: lock NS list changes while handling command effects (bsc#1123882).
- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).
- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).
- nvme-multipath: round-robin I/O policy (bsc#1110705).
- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).
- of, numa: Validate some distance map rules (bsc#1051510).
- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).
- omap2fb: Fix stack memory disclosure (bsc#1120902)
- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).
- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).
- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).
- packet: Do not leak dev refcounts on error exit (git-fixes).
- packet: validate address length if non-zero (networking-stable-19_01_04).
- packet: validate address length (networking-stable-19_01_04).
- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).
- Partially revert 'block: fail op_is_write() requests to (bsc#1125252).
- PCI: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).
- PCI: Disable broken RTIT_BAR of Intel TH (bsc#1120318).
- PCI: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- PCI/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).
- PCI: qcom: Do not deassert reset GPIO during probe (bsc#1129281).
- pcrypt: use format specifier in kobject_add (bsc#1051510).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).
- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).
- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).
- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).
- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).
- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).
- phy: tegra: remove redundant self assignment of 'map' (bsc#1051510).
- phy: work around 'phys' references to usb-nop-xceiv devices (bsc#1051510).
- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).
- pinctrl: meson: fix pull enable register calculation (bsc#1051510).
- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).
- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).
- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).
- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).
- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).
- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).
- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).
- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).
- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).
- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).
- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).
- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).
- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).
- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).
- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).
- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).
- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).
- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).
- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).
- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).
- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).
- powerpc/tm: Fix comment (bsc#1118338).
- powerpc/tm: Fix endianness flip on trap (bsc#1118338).
- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).
- powerpc/tm: Fix HTM documentation (bsc#1118338).
- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).
- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).
- powerpc/tm: Print 64-bits MSR (bsc#1118338).
- powerpc/tm: Print scratch value (bsc#1118338).
- powerpc/tm: Reformat comments (bsc#1118338).
- powerpc/tm: Remove msr_tm_active() (bsc#1118338).
- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).
- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).
- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).
- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).
- powerpc/tm: Update function prototype comment (bsc#1118338).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).
- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).
- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).
- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).
- ptp_kvm: probe for kvm guest availability (bsc#1098382).
- ptr_ring: wrap back ->producer in __ptr_ring_swap_queue() (networking-stable-19_01_04).
- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).
- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).
- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).
- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).
- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).
- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).
- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).
- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).
- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).
- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).
- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).
- RDMA/core: Fix unwinding flow in case of error to register device (bsc#1046306).
- RDMA/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).
- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)
- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).
- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).
- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).
- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).
- Remove blacklist of virtio patch so we can install it (bsc#1114585)
- Revert 'drm/rockchip: Allow driver to be shutdown on reboot/kexec' (bsc#1051510).
- Revert 'Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G' (bsc#1051510).
- Revert 'openvswitch: Fix template leak in error cases.' (bsc#1051510).
- Revert 'scsi: qla2xxx: Fix NVMe Target discovery' (bsc#1125252).
- Revert 'serial: 8250: Fix clearing FIFOs in RS485 mode again' (bsc#1051510).
- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.
- Revert 'xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue' (bsc#1120854).
- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).
- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697)
- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)
- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).
- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).
- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).
- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).
- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).
- s390/early: improve machine detection (git-fixes).
- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).
- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).
- s390/qeth: fix use-after-free in error path (bsc#1127534).
- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).
- s390/sthyi: Fix machine name validity indication (git-fixes).
- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).
- sata_rcar: fix deferred probing (bsc#1051510).
- sbus: char: add of_node_put() (bsc#1051510).
- sc16is7xx: Fix for multi-channel stall (bsc#1051510).
- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).
- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- sch_multiq: fix double free on init failure (bsc#1051510).
- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes
- scripts/git_sort/git_sort.py: Add s390/linux.git fixes.
- scripts/git_sort/git_sort.py: add vfs 'fixes' branch
- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).
- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).
- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).
- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).
- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).
- scsi: lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).
- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).
- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).
- scsi: lpfc: fix remoteport access (bsc#1125252).
- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).
- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).
- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).
- scsi: mpt3sas: Add ioc_<level> logging macros (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_<level> with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_<level> with MPT3SAS_FMT to ioc_<level> (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).
- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).
- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).
- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).
- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).
- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).
- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).
- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).
- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).
- scsi: qla2xxx: Simplify conditional check (bsc#1094555).
- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).
- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).
- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).
- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).
- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).
- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).
- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).
- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).
- sctp: kfree_rcu asoc (networking-stable-18_12_12).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).
- selftests/livepatch: introduce tests (bsc#1071995).
- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).
- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).
- selinux: always allow mounting submounts (bsc#1051510).
- selinux: fix GPF on invalid policy (bsc#1051510).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).
- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).
- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).
- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).
- serial: imx: fix error handling in console_setup (bsc#1051510).
- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).
- serial/sunsu: fix refcount leak (bsc#1051510).
- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).
- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).
- signal: Always deliver the kernel's SIGKILL and SIGSTOP to a pid namespace init (git-fixes).
- skge: potential memory corruption in skge_get_regs() (bsc#1051510).
- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).
- sky2: Increase D3 delay again (bsc#1051510).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).
- smb3.1.1 dialect is no longer experimental (bsc#1051510).
- smb311: Fix reconnect (bsc#1051510).
- smb311: Improve checking of negotiate security contexts (bsc#1051510).
- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).
- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).
- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).
- smb3: check for and properly advertise directory lease support (bsc#1051510).
- smb3: directory sync should not return an error (bsc#1051510).
- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).
- smb3: do not request leases in symlink creation and query (bsc#1051510).
- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510).
- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).
- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).
- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).
- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).
- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).
- smb3: fix various xid leaks (bsc#1051510).
- smb3: Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510).
- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).
- smb3: Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510).
- smb3: remove noisy warning message on mount (bsc#1129664).
- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).
- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).
- soc/tegra: Do not leak device tree node reference (bsc#1051510).
- splice: do not merge into linked buffers (git-fixes).
- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).
- staging: iio: ad7780: update voltage on read (bsc#1051510).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).
- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).
- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).
- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).
- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).
- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).
- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).
- staging: speakup: Replace strncpy with memcpy (bsc#1051510).
- staging: wilc1000: fix to set correct value for 'vif_num' (bsc#1051510).
- sunrpc: correct the computation for page_ptr when truncating (git-fixes).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- sunrpc: Fix leak of krb5p encode pages (git-fixes).
- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).
- sunrpc: safely reallow resvport min/max inversion (git-fixes).
- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).
- swiotlb: Add is_swiotlb_active() function (bsc#1120008).
- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).
- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).
- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).
- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).
- tcp: batch tcp_net_metrics_exit (bsc#1122982).
- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).
- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).
- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).
- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).
- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).
- tcp: lack of available data can also cause TSO defer (git-fixes).
- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).
- team: Free BPF filter when unregistering netdev (bsc#1051510).
- The PCI SSID matches with other machine(s?) on the market, and leads to the boot problem. (bsc#1122554)
- There are no more #ifdef checking these macros.
- Thermal: do not clear passive state during system sleep (bsc#1051510).
- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).
- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).
- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).
- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).
- thermal: mediatek: fix register index error (bsc#1051510).
- timekeeping: Use proper seqcount initializer (bsc#1051510).
- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).
- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).
- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).
- tipc: fix a double kfree_skb() (networking-stable-19_01_04).
- tipc: fix a race condition of releasing subscriber object (bsc#1051510).
- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).
- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).
- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).
- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).
- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).
- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).
- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).
- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).
- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).
- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).
- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).
- tracing: Do not free iter->trace in fail path of tracing_open_pipe() (bsc#1129581).
- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).
- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).
- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).
- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).
- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).
- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).
- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).
- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).
- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).
- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).
- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).
- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).
- uevent: add alloc_uevent_skb() helper (bsc#1122982).
- uio_hv_generic: defer opening vmbus until first use (bsc#1127578).
- uio_hv_generic: set callbacks on open (bsc#1127578).
- uio: introduce UIO_MEM_IOVA (bsc#1127578).
- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).
- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).
- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.
- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).
- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).
- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).
- usb: Add new USB LPM helpers (bsc#1120902).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).
- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).
- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).
- usb: dwc3: gadget: Clear req->needs_extra_trb flag on cleanup (bsc#1120902).
- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).
- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).
- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).
- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).
- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).
- usb: musb: dsps: fix otg state machine (bsc#1051510).
- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).
- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).
- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).
- usb: phy: am335x: fix race condition in _probe (bsc#1051510).
- usb: serial: option: add Fibocom NL678 series (bsc#1120902).
- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).
- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).
- usb: storage: add quirk for SMI SM3350 (bsc#1120902).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).
- usb: xhci: fix 'broken_suspend' placement in struct xchi_hcd (bsc#1119086).
- veth: set peer GSO values (bsc#1051510).
- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).
- vfio: ccw: process ssch with interrupts disabled (git-fixes).
- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).
- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).
- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).
- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).
- vhost: log dirty page correctly (networking-stable-19_01_26).
- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).
- vhost/vsock: fix uninitialized vhost_vsock->guest_cid (bsc#1051510).
- video: clps711x-fb: release disp device node in probe() (bsc#1051510).
- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).
- virtio: Introduce virtio_max_dma_size() (bsc#1120008).
- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).
- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).
- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).
- virtio/s390: avoid race on vcdev->config (git-fixes).
- virtio/s390: fix race in ccw_io_helper() (git-fixes).
- vmbus: fix subchannel removal (bsc#1127578).
- vmbus: keep pointer to ring buffer page (bsc#1127578).
- vmbus: pass channel to hv_process_channel_removal (bsc#1127578).
- vmbus: split ring buffer allocation from open (bsc#1127578).
- VMCI: Support upto 64-bit PPNs (bsc#1127286).
- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).
- vsock: Send reset control packet when socket is partially bound (networking-stable-19_01_04).
- vt: invoke notifier on screen size change (bsc#1051510).
- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).
- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).
- vxlan: test dev->flags & IFF_UP before calling gro_cells_receive() (git-fixes).
- vxlan: update skb dst pmtu on tx path (bsc#1123456).
- w90p910_ether: remove incorrect __init annotation (bsc#1051510).
- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).
- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).
- writeback: do not decrement wb->refcnt if !wb->bdi (git fixes (writeback)).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86/a.out: Clear the dump structure initially (bsc#1114279).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).
- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).
- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).
- x86/bugs: Add AMD's variant of SSB_NO (bsc#1114279).
- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).
- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).
- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).
- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).
- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).
- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).
- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).
- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).
- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).
- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).
- x86/vdso: Remove obsolete 'fake section table' reservation (bsc#1114279).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).
- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).
- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: fix dom0 boot on huge systems (bsc#1127836).
- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).
- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).
- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).
- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).
- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).
- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).
- yama: Check for pid death before checking ancestry (bsc#1051510).
- yam: fix a missing-check bug (bsc#1051510).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).
- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).
Patchnames
SUSE-2019-785,SUSE-SLE-Module-Public-Cloud-15-2019-785
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).\n- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) can cause a system lock up and a denial of service. (bnc#1123161).\n- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).\n- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).\n- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n- CVE-2019-7221: The KVM implementation had a Use-after-Free problem (bnc#1124732).\n- CVE-2019-7222: The KVM implementation had an Information Leak (bnc#1124735).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).\n- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks. (bnc#1122971).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).\n- 9p: clear dangling pointers in p9stat_free (bsc#1051510).\n- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).\n- 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n- 9p/net: put a lower bound on msize (bsc#1051510).\n- 9p: use inode-\u003ei_lock to protect i_size_write() under 32-bit (bsc#1051510).\n- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).\n- acpi/device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).\n- acpi/nfit: Block function zero DSMs (bsc#1051510).\n- acpi/nfit: Fix Address Range Scrub completion tracking (bsc#1124969).\n- acpi/nfit: Fix bus command validation (bsc#1051510).\n- acpi/nfit: Fix command-supported detection (bsc#1051510).\n- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).\n- acpi/nfit: Fix user-initiated ARS to be \u0027ARS-long\u0027 rather than \u0027ARS-short\u0027 (bsc#1124969).\n- acpi/numa: Use correct type for printing addresses on i386-PAE (bsc#1051510).\n- acpi/power: Skip duplicate power resource references in _PRx (bsc#1051510).\n- acpi/video: Extend chassis-type detection with a \u0027Lunch Box\u0027 check (bsc#1051510).\n- acpi/video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705\n- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).\n- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).\n- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).\n- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).\n- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).\n- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).\n- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).\n- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).\n- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).\n- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).\n- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).\n- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).\n- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).\n- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).\n- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).\n- alsa: hda - Serialize codec registrations (bsc#1122944).\n- alsa: hda - Use standard device registration for beep (bsc#1122944).\n- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).\n- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).\n- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).\n- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).\n- altera-stapl: check for a null key before strcasecmp\u0027ing it (bsc#1051510).\n- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).\n- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).\n- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).\n- arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).\n- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).\n- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).\n- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).\n- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n- arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).\n- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).\n- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).\n- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).\n- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).\n- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).\n- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).\n- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).\n- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).\n- arm: pxa: avoid section mismatch warning (bsc#1051510).\n- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).\n- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).\n- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).\n- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).\n- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).\n- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).\n- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).\n- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).\n- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).\n- assoc_array: Fix shortcut creation (bsc#1051510).\n- ata: ahci: mvebu: remove stale comment (bsc#1051510).\n- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).\n- ath9k: dynack: check da-\u003eenabled first in sampling routines (bsc#1051510).\n- ath9k: dynack: make ewma estimation faster (bsc#1051510).\n- ath9k: dynack: use authentication messages for \u0027late\u0027 ack (bsc#1051510).\n- atm: he: fix sign-extension overflow on large shift (bsc#1051510).\n- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).\n- ax25: fix possible use-after-free (bsc#1051510).\n- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)\n- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).\n- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).\n- batman-adv: Force mac header to start of data on xmit (bsc#1051510).\n- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).\n- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).\n- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).\n- blk-mq: fix a hung issue when fsync (bsc#1125252).\n- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).\n- block: break discard submissions into the user defined size (git-fixes).\n- block: cleanup __blkdev_issue_discard() (git-fixes).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- blockdev: Fix livelocks on loop device (bsc#1124984).\n- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128895).\n- block: do not warn when doing fsync on read-only devices (bsc#1125252).\n- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).\n- block: fix infinite loop if the device loses discard capability (git-fixes).\n- block/loop: Use global lock for ioctl() operation (bsc#1124974).\n- block: make sure discard bio is aligned with logical block size (git-fixes).\n- block: make sure writesame bio is aligned with logical block size (git-fixes).\n- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).\n- Bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).\n- Bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).\n- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).\n- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).\n- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).\n- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).\n- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).\n- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282).\n- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).\n- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).\n- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).\n- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1083647).\n- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).\n- bpf: Fix syscall\u0027s stackmap lookup potential deadlock (bsc#1083647).\n- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).\n- bpf/verifier: fix verifier instability (bsc#1056787).\n- bsg: allocate sense buffer if requested (bsc#1106811).\n- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).\n- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).\n- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).\n- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).\n- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).\n- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).\n- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).\n- btrfs: fix fsync after succession of renames of different files (bsc#1126481).\n- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).\n- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).\n- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).\n- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).\n- btrfs: Improve btrfs_search_slot description (bsc#1126802).\n- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1063638).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).\n- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).\n- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).\n- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1063638).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).\n- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).\n- btrfs: remove always true check in unlock_up (bsc#1126802).\n- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).\n- btrfs: remove unnecessary level check in balance_level (bsc#1126802).\n- btrfs: remove unused check of skip_locking (bsc#1126802).\n- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).\n- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).\n- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n- btrfs: split btrfs_extent_same (bsc#1127493).\n- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).\n- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).\n- can: bcm: check timer values before ktime conversion (bsc#1051510).\n- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).\n- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).\n- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).\n- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126790).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).\n- cfg80211: extend range deviation for DMG (bsc#1051510).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).\n- checkstack.pl: fix for aarch64 (bsc#1051510).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: add missing debug entries for kconfig options (bsc#1051510).\n- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510).\n- cifs: add sha512 secmech (bsc#1051510).\n- cifs: Add support for reading attributes on SMB2+ (bsc#1051510).\n- cifs: Add support for writing attributes on SMB2+ (bsc#1051510).\n- cifs: Always resolve hostname before reconnecting (bsc#1051510).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).\n- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).\n- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).\n- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510).\n- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).\n- cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n- cifs: fix return value for cifs_listxattr (bsc#1051510).\n- cifs: Fix separator when building path from dentry (bsc#1051510).\n- cifs: fix set info (bsc#1051510).\n- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).\n- cifs: fix wrapping bugs in num_entries() (bsc#1051510).\n- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: implement v3.11 preauth integrity (bsc#1051510).\n- cifs: invalidate cache when we truncate a file (bsc#1051510).\n- cifs: make \u0027nodfs\u0027 mount opt a superblock flag (bsc#1051510).\n- cifs: OFD locks do not conflict with eachothers (bsc#1051510).\n- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).\n- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: refactor crypto shash/sdesc allocation\u0026free (bsc#1051510).\n- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).\n- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).\n- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).\n- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).\n- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).\n- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).\n- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).\n- clk: imx6q: reset exclusive gates on init (bsc#1051510).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).\n- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).\n- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).\n- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).\n- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).\n- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).\n- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).\n- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).\n- clk: socfpga: fix refcount leak (bsc#1051510).\n- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).\n- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).\n- clk: sunxi-ng: enable so-said LDOs for A64 SoC\u0027s pll-mipi clock (bsc#1051510).\n- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).\n- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).\n- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).\n- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).\n- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).\n- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).\n- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).\n- configfs: fix registered group removal (bsc#1051510).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).\n- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).\n- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).\n- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).\n- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).\n- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).\n- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).\n- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).\n- crypto: ahash - fix another early termination in hash walk (bsc#1051510).\n- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).\n- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).\n- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).\n- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).\n- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).\n- crypto: caam - fixed handling of sg list (bsc#1051510).\n- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).\n- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).\n- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).\n- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).\n- crypto: hash - set CRYPTO_TFM_NEED_KEY if -\u003esetkey() fails (bsc#1051510).\n- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).\n- crypto: tgr192 - fix unaligned memory access (bsc#1051510).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).\n- cw1200: drop useless LIST_HEAD (bsc#1051510).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).\n- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).\n- debugfs: fix debugfs_rename parameter checking (bsc#1051510).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).\n- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).\n- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).\n- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).\n- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).\n- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).\n- dmaengine: at_hdmac: fix module unloading (bsc#1051510).\n- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).\n- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).\n- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).\n- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).\n- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).\n- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).\n- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).\n- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).\n- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).\n- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).\n- dma: Introduce dma_max_mapping_size() (bsc#1120008).\n- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).\n- dm: call blk_queue_split() to impose device limits on bios (git-fixes).\n- dm: do not allow readahead to limit IO size (git-fixes).\n- dm thin: send event about thin-pool state change _after_ making it (git-fixes).\n- dm zoned: Fix target BIO completion handling (git-fixes).\n- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).\n- doc/README.SUSE: Correct description for building a kernel (bsc#1123348) The obsoleted make cloneconfig is corrected. Also the order of make scripts and make prepare are corrected as well.\n- Do not log confusing message on reconnect by default (bsc#1129664).\n- Do not log expected error on DFS referral request (bsc#1051510).\n- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).\n- driver core: Move async_synchronize_full call (bsc#1051510).\n- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).\n- Drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).\n- Drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).\n- Drivers: hv: vmbus: Remove the useless API vmbus_get_outgoing_channel() (bsc#1127578).\n- Drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).\n- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).\n- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- drivers/sbus/char: add of_node_put() (bsc#1051510).\n- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).\n- drm/ast: Fix connector leak during driver unload (bsc#1051510).\n- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).\n- drm/atomic-helper: Complete fake_commit-\u003eflip_done potentially earlier (bsc#1051510).\n- drm: Block fb changes for async plane updates (bsc#1051510).\n- drm/bridge: tc358767: add defines for DP1_SRCCTRL \u0026 PHY_2LANE (bsc#1051510).\n- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).\n- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).\n- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).\n- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).\n- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n- drm: Clear state-\u003eacquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).\n- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).\n- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)\n- drm/etnaviv: potential NULL dereference (bsc#1113722)\n- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)\n- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)\n- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)\n- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n- drm/i915/gvt: Fix mmap range check (bsc#1120902)\n- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)\n- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).\n- drm/i915/opregion: fix version check (bsc#1113722)\n- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)\n- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)\n- drm/meson: add missing of_node_put (bsc#1051510).\n- drm/modes: Prevent division by zero htotal (bsc#1051510).\n- drm/msm: Fix error return checking (bsc#1051510).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).\n- drm/msm: Unblock writer if reader closes file (bsc#1051510).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)\n- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).\n- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)\n- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)\n- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).\n- drm/rockchip: fix for mailbox read size (bsc#1051510).\n- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)\n- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)\n- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)\n- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).\n- earlycon: Initialize port-\u003euartclk based on clock-frequency property (bsc#1051510).\n- earlycon: Remove hardcoded port-\u003euartclk initialization in of_setup_earlycon (bsc#1051510).\n- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).\n- enic: fix checksum validation for IPv6 (bsc#1051510).\n- esp6: fix memleak on error path in esp6_input (bsc#1051510).\n- esp: Fix locking on page fragment allocation (bsc#1051510).\n- esp: Fix memleaks on error paths (bsc#1051510).\n- esp: Fix skb tailroom calculation (bsc#1051510).\n- exportfs: do not read dentry after free (bsc#1051510).\n- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).\n- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).\n- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).\n- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).\n- fanotify: fix handling of events on child sub-directory (bsc#1122019).\n- fat: validate -\u003ei_start before using (bsc#1051510).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1113722)\n- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).\n- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).\n- floppy: check_events callback should not return a negative number (bsc#1051510).\n- fork: do not copy inconsistent signal handler state to child (bsc#1051510).\n- fork: record start_time late (git-fixes).\n- fork: unconditionally clear stack on fork (git-fixes).\n- fs/cifs: require sha512 (bsc#1051510).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).\n- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).\n- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).\n- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).\n- fuse: handle zero sized retrieve correctly (bsc#1051510).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bsc#1051510).\n- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).\n- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).\n- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).\n- geneve, vxlan: Do not set exceptions if skb-\u003elen \u003c mtu (bsc#1123456).\n- genwqe: Fix size check (bsc#1051510).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bsc#1120601).\n- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).\n- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).\n- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).\n- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).\n- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).\n- gpio: pl061: handle failed allocations (bsc#1051510).\n- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).\n- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)\n- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).\n- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).\n- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).\n- hfs: do not free node before using (bsc#1051510).\n- hfsplus: do not free node before using (bsc#1051510).\n- hfsplus: prevent btree data loss on root split (bsc#1051510).\n- hfs: prevent btree data loss on root split (bsc#1051510).\n- HID: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).\n- hpet: Fix missing \u0027=\u0027 character in the __setup() code of hpet_mmap_enable (git-fixes).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).\n- hv_uio_generic: map ringbuffer phys addr (bsc#1127578).\n- hv: v4.12 API for hyperv-iommu (bsc#1122822).\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).\n- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).\n- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).\n- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).\n- i2c-axxia: check for error conditions first (bsc#1051510).\n- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).\n- i2c: cadence: Fix the hold bit setting (bsc#1051510).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).\n- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).\n- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).\n- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).\n- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).\n- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).\n- IB/core: Destroy QP if XRC QP fails (bsc#1046306).\n- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).\n- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).\n- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).\n- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- ide: pmac: add of_node_put() (bsc#1051510).\n- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).\n- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).\n- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).\n- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).\n- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).\n- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).\n- input: bma150 - register input device after setting private data (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).\n- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).\n- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).\n- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).\n- input: raspberrypi-ts - fix link error (git-fixes).\n- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).\n- input: restore EV_ABS ABS_RESERVED (bsc#1051510).\n- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).\n- input: synaptics - enable SMBus for HP EliteBook 840 G4 (bsc#1051510).\n- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).\n- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).\n- intel_th: Do not reference unassigned outputs (bsc#1051510).\n- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).\n- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).\n- iomap: warn on zero-length mappings (bsc#1127062).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).\n- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).\n- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).\n- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).\n- ipmi:pci: Blacklist a Realtek \u0027IPMI\u0027 device (git-fixes).\n- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).\n- ipsec: check return value of skb_to_sgvec always (bsc#1051510).\n- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).\n- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: addrlabel: per netns list (bsc#1122982).\n- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).\n- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).\n- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).\n- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).\n- ip: validate header length on virtual device xmit (networking-stable-19_01_04).\n- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).\n- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).\n- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).\n- iscsi target: fix session creation failure handling (bsc#1051510).\n- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).\n- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).\n- iser: set sector for ambiguous mr status errors (bsc#1051510).\n- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).\n- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).\n- iwlwifi: mvm: fix RSS config command (bsc#1051510).\n- iwlwifi: pcie: fix emergency path (bsc#1051510).\n- iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).\n- ixgbe: check return value of napi_complete_done() (bsc#1051510).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).\n- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).\n- kABI: fix xhci kABI stability (bsc#1119086).\n- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).\n- kabi: handle addition of uevent_sock into struct net (bsc#1122982).\n- kABI: Preserve kABI for dma_max_mapping_size() (bsc#1120008).\n- kABI: protect struct sctp_association (kabi).\n- kABI: protect vhost_log_write (kabi).\n- kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).\n- kABI workaround for bt_accept_enqueue() change (bsc#1051510).\n- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).\n- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).\n- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).\n- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).\n- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).\n- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).\n- KEYS: allow reaching the keys quotas exactly (bsc#1051510).\n- keys: Timestamp new keys (bsc#1051510).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).\n- kgdboc: Fix restrict error (bsc#1051510).\n- kgdboc: Fix warning with module build (bsc#1051510).\n- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).\n- kobject: copy env blob in one go (bsc#1122982).\n- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).\n- KVM: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).\n- KVM: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).\n- KVM: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).\n- KVM: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).\n- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).\n- KVM: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).\n- KVM: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).\n- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- KVM: x86: fix L1TF\u0027s MMIO GFN calculation (bsc#1124204).\n- KVM: x86: Fix single-step debugging (bsc#1129295).\n- KVM: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).\n- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).\n- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).\n- lan78xx: Resolve issue with changing MAC address (bsc#1051510).\n- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).\n- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).\n- libceph: handle an empty authorize reply (bsc#1126789).\n- lib/div64.c: off by one in shift (bsc#1051510).\n- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).\n- libnvdimm/label: Clear \u0027updating\u0027 flag after label-set update (bsc#1129543).\n- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).\n- lib/rbtree-test: lower default params (git-fixes).\n- lightnvm: fail fast on passthrough commands (bsc#1125780).\n- livepatch: Change unsigned long old_addr -\u003e void *old_func in struct klp_func (bsc#1071995).\n- livepatch: Consolidate klp_free functions (bsc#1071995 ).\n- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).\n- livepatch: Define a macro for new API identification (bsc#1071995).\n- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).\n- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).\n- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).\n- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).\n- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).\n- livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).\n- livepatch: Send a fake signal periodically (bsc#1071995 ).\n- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).\n- livepatch: Simplify API by removing registration step (bsc#1071995).\n- llc: do not use sk_eat_skb() (bsc#1051510).\n- lockd: fix access beyond unterminated strings in prints (git-fixes).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: drop caches if offset or block_size are changed (bsc#1124975).\n- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).\n- LSM: Check for NULL cred-security on free (bsc#1051510).\n- mac80211: Add attribute aligned(2) to struct \u0027action\u0027 (bsc#1051510).\n- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).\n- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).\n- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).\n- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).\n- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).\n- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).\n- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).\n- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).\n- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).\n- media: s5k4ecgx: delete a bogus error message (bsc#1051510).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).\n- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).\n- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).\n- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).\n- media: uvcvideo: Fix \u0027type\u0027 check leading to overflow (bsc#1051510).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).\n- media: v4l2-tpg: array index could become negative (bsc#1051510).\n- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).\n- media: vb2: be sure to unlock mutex on errors (bsc#1051510).\n- media: vb2: vb2_mmap: move lock up (bsc#1051510).\n- media: vivid: fix error handling of kthread_run (bsc#1051510).\n- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).\n- media: vivid: set min width/height to a value \u003e 0 (bsc#1051510).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).\n- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).\n- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).\n- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).\n- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).\n- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).\n- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).\n- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).\n- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).\n- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).\n- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).\n- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).\n- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).\n- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).\n- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).\n- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).\n- misc: sram: enable clock before registering regions (bsc#1051510).\n- misc: sram: fix resource leaks in probe error path (bsc#1051510).\n- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).\n- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).\n- mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).\n- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).\n- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).\n- mmap: relax file size limit for regular files (git fixes (mm/mmap)).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).\n- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).\n- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).\n- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).\n- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).\n- mmc: omap: fix the maximum timeout setting (bsc#1051510).\n- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).\n- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n- mmc: spi: Fix card detection during probe (bsc#1051510).\n- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).\n- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).\n- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).\n- mm/ksm.c: ignore STABLE_FLAG of rmap_item-\u003eaddress in rmap_walk_ksm() (git fixes (mm/ksm)).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).\n- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).\n- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)\n- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).\n- mm: migration: factor out code to compute expected number of page references (bsc#1084216).\n- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).\n- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).\n- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).\n- mpt3sas: check sense buffer before copying sense data (bsc#1106811).\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).\n- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).\n- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).\n- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).\n- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).\n- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).\n- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).\n- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).\n- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).\n- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).\n- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).\n- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).\n- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).\n- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).\n- mtd: nand: ifc: update bufnum mask for ver \u003e= 2.0.0 (bsc#1051510).\n- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).\n- mtd: nand: omap2: Fix subpage write (bsc#1051510).\n- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).\n- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).\n- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).\n- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).\n- mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).\n- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).\n- mv88e6060: disable hardware level MAC learning (bsc#1051510).\n- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).\n- neighbour: Avoid writing before skb-\u003ehead in neigh_hh_output() (networking-stable-18_12_12).\n- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).\n- net: add uevent socket member (bsc#1122982).\n- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).\n- net: aquantia: fixed instack structure overflow (git-fixes).\n- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).\n- net: bcmgenet: abort suspend on error (bsc#1051510).\n- net: bcmgenet: code movement (bsc#1051510).\n- net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n- net: bcmgenet: return correct value \u0027ret\u0027 from bcmgenet_power_down (bsc#1051510).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).\n- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- net: do not call update_pmtu unconditionally (bsc#1123456).\n- net: Do not default Cavium PTP driver to \u0027y\u0027 (bsc#1110096).\n- net: dp83640: expire old TX-skb (networking-stable-19_02_10).\n- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).\n- net: ena: fix race between link up and device initalization (bsc#1083548).\n- netfilter: nf_tables: check the result of dereferencing base_chain-\u003estats (git-fixes).\n- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).\n- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).\n- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).\n- net: hns3: add handling for big TX fragment (bsc#1104353 ).\n- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).\n- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).\n- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).\n- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).\n- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).\n- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).\n- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).\n- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).\n- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).\n- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).\n- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).\n- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).\n- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).\n- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).\n- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).\n- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).\n- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Release resource on error flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).\n- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).\n- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).\n- netns: restrict uevents (bsc#1122982).\n- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).\n- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).\n- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).\n- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).\n- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).\n- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).\n- netrom: switch to sock timer API (bsc#1051510).\n- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).\n- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).\n- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).\n- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).\n- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).\n- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).\n- net: stmmac: Fix PCI module removal leak (git-fixes).\n- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).\n- net: stmmac: Use mutex instead of spinlock (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).\n- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).\n- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).\n- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).\n- nfit: acpi_nfit_ctl(): Check out_obj-\u003etype in the right place (bsc#1129547).\n- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).\n- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).\n- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).\n- nfsd: Fix an Oops in free_session() (git-fixes).\n- nfs: Fix a missed page unlock after pg_doio() (git-fixes).\n- NFS: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).\n- NFSv4.1: Fix the r/wsize checking (git-fixes).\n- NFSv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).\n- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).\n- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).\n- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).\n- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).\n- nvme: kABI fix for scan_lock (bsc#1123882).\n- nvme: lock NS list changes while handling command effects (bsc#1123882).\n- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).\n- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).\n- nvme-multipath: round-robin I/O policy (bsc#1110705).\n- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).\n- of, numa: Validate some distance map rules (bsc#1051510).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).\n- omap2fb: Fix stack memory disclosure (bsc#1120902)\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).\n- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).\n- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).\n- packet: Do not leak dev refcounts on error exit (git-fixes).\n- packet: validate address length if non-zero (networking-stable-19_01_04).\n- packet: validate address length (networking-stable-19_01_04).\n- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).\n- Partially revert \u0027block: fail op_is_write() requests to (bsc#1125252).\n- PCI: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).\n- PCI: Disable broken RTIT_BAR of Intel TH (bsc#1120318).\n- PCI: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).\n- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).\n- PCI/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).\n- PCI: qcom: Do not deassert reset GPIO during probe (bsc#1129281).\n- pcrypt: use format specifier in kobject_add (bsc#1051510).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).\n- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).\n- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).\n- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).\n- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).\n- phy: tegra: remove redundant self assignment of \u0027map\u0027 (bsc#1051510).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bsc#1051510).\n- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).\n- pinctrl: meson: fix pull enable register calculation (bsc#1051510).\n- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).\n- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).\n- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).\n- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).\n- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).\n- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).\n- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).\n- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).\n- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).\n- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).\n- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).\n- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).\n- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).\n- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).\n- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).\n- powerpc/tm: Fix comment (bsc#1118338).\n- powerpc/tm: Fix endianness flip on trap (bsc#1118338).\n- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).\n- powerpc/tm: Fix HTM documentation (bsc#1118338).\n- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).\n- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).\n- powerpc/tm: Print 64-bits MSR (bsc#1118338).\n- powerpc/tm: Print scratch value (bsc#1118338).\n- powerpc/tm: Reformat comments (bsc#1118338).\n- powerpc/tm: Remove msr_tm_active() (bsc#1118338).\n- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).\n- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).\n- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).\n- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).\n- powerpc/tm: Update function prototype comment (bsc#1118338).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).\n- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).\n- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).\n- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).\n- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).\n- ptp_kvm: probe for kvm guest availability (bsc#1098382).\n- ptr_ring: wrap back -\u003eproducer in __ptr_ring_swap_queue() (networking-stable-19_01_04).\n- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).\n- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).\n- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).\n- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).\n- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).\n- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).\n- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).\n- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).\n- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).\n- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).\n- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).\n- RDMA/core: Fix unwinding flow in case of error to register device (bsc#1046306).\n- RDMA/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).\n- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).\n- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).\n- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).\n- Remove blacklist of virtio patch so we can install it (bsc#1114585)\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1051510).\n- Revert \u0027Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G\u0027 (bsc#1051510).\n- Revert \u0027openvswitch: Fix template leak in error cases.\u0027 (bsc#1051510).\n- Revert \u0027scsi: qla2xxx: Fix NVMe Target discovery\u0027 (bsc#1125252).\n- Revert \u0027serial: 8250: Fix clearing FIFOs in RS485 mode again\u0027 (bsc#1051510).\n- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.\n- Revert \u0027xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue\u0027 (bsc#1120854).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).\n- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697)\n- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)\n- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).\n- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).\n- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).\n- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).\n- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).\n- s390/early: improve machine detection (git-fixes).\n- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).\n- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).\n- s390/qeth: fix use-after-free in error path (bsc#1127534).\n- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).\n- s390/sthyi: Fix machine name validity indication (git-fixes).\n- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).\n- sata_rcar: fix deferred probing (bsc#1051510).\n- sbus: char: add of_node_put() (bsc#1051510).\n- sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).\n- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- sch_multiq: fix double free on init failure (bsc#1051510).\n- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes\n- scripts/git_sort/git_sort.py: Add s390/linux.git fixes.\n- scripts/git_sort/git_sort.py: add vfs \u0027fixes\u0027 branch\n- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).\n- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).\n- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).\n- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).\n- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).\n- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).\n- scsi: lpfc: fix remoteport access (bsc#1125252).\n- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).\n- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).\n- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).\n- scsi: mpt3sas: Add ioc_\u003clevel\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u003clevel\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u003clevel\u003e with MPT3SAS_FMT to ioc_\u003clevel\u003e (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).\n- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).\n- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).\n- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).\n- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).\n- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).\n- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).\n- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).\n- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).\n- scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).\n- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).\n- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).\n- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).\n- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).\n- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).\n- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).\n- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).\n- sctp: kfree_rcu asoc (networking-stable-18_12_12).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).\n- selftests/livepatch: introduce tests (bsc#1071995).\n- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).\n- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).\n- selinux: always allow mounting submounts (bsc#1051510).\n- selinux: fix GPF on invalid policy (bsc#1051510).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).\n- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).\n- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).\n- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).\n- serial: imx: fix error handling in console_setup (bsc#1051510).\n- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).\n- serial/sunsu: fix refcount leak (bsc#1051510).\n- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).\n- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).\n- signal: Always deliver the kernel\u0027s SIGKILL and SIGSTOP to a pid namespace init (git-fixes).\n- skge: potential memory corruption in skge_get_regs() (bsc#1051510).\n- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).\n- sky2: Increase D3 delay again (bsc#1051510).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).\n- smb3.1.1 dialect is no longer experimental (bsc#1051510).\n- smb311: Fix reconnect (bsc#1051510).\n- smb311: Improve checking of negotiate security contexts (bsc#1051510).\n- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).\n- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).\n- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).\n- smb3: check for and properly advertise directory lease support (bsc#1051510).\n- smb3: directory sync should not return an error (bsc#1051510).\n- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).\n- smb3: do not request leases in symlink creation and query (bsc#1051510).\n- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510).\n- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).\n- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).\n- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).\n- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).\n- smb3: fix various xid leaks (bsc#1051510).\n- smb3: Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510).\n- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).\n- smb3: Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510).\n- smb3: remove noisy warning message on mount (bsc#1129664).\n- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).\n- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).\n- soc/tegra: Do not leak device tree node reference (bsc#1051510).\n- splice: do not merge into linked buffers (git-fixes).\n- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).\n- staging: iio: ad7780: update voltage on read (bsc#1051510).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).\n- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).\n- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).\n- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).\n- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).\n- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).\n- staging: speakup: Replace strncpy with memcpy (bsc#1051510).\n- staging: wilc1000: fix to set correct value for \u0027vif_num\u0027 (bsc#1051510).\n- sunrpc: correct the computation for page_ptr when truncating (git-fixes).\n- sunrpc: Fix a potential race in xprt_connect() (git-fixes).\n- sunrpc: Fix leak of krb5p encode pages (git-fixes).\n- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).\n- sunrpc: safely reallow resvport min/max inversion (git-fixes).\n- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).\n- swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).\n- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).\n- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).\n- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).\n- tcp: batch tcp_net_metrics_exit (bsc#1122982).\n- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).\n- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).\n- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).\n- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).\n- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).\n- tcp: lack of available data can also cause TSO defer (git-fixes).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).\n- team: Free BPF filter when unregistering netdev (bsc#1051510).\n- The PCI SSID matches with other machine(s?) on the market, and leads to the boot problem. (bsc#1122554) \n- There are no more #ifdef checking these macros.\n- Thermal: do not clear passive state during system sleep (bsc#1051510).\n- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).\n- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).\n- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).\n- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).\n- thermal: mediatek: fix register index error (bsc#1051510).\n- timekeeping: Use proper seqcount initializer (bsc#1051510).\n- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).\n- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).\n- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).\n- tipc: fix a double kfree_skb() (networking-stable-19_01_04).\n- tipc: fix a race condition of releasing subscriber object (bsc#1051510).\n- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).\n- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).\n- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).\n- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).\n- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).\n- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).\n- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).\n- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).\n- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).\n- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).\n- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).\n- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).\n- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).\n- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).\n- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).\n- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).\n- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).\n- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).\n- uevent: add alloc_uevent_skb() helper (bsc#1122982).\n- uio_hv_generic: defer opening vmbus until first use (bsc#1127578).\n- uio_hv_generic: set callbacks on open (bsc#1127578).\n- uio: introduce UIO_MEM_IOVA (bsc#1127578).\n- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).\n- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).\n- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.\n- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).\n- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).\n- usb: Add new USB LPM helpers (bsc#1120902).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).\n- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).\n- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).\n- usb: dwc3: gadget: Clear req-\u003eneeds_extra_trb flag on cleanup (bsc#1120902).\n- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).\n- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).\n- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).\n- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).\n- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).\n- usb: musb: dsps: fix otg state machine (bsc#1051510).\n- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).\n- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).\n- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n- usb: phy: am335x: fix race condition in _probe (bsc#1051510).\n- usb: serial: option: add Fibocom NL678 series (bsc#1120902).\n- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).\n- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).\n- usb: storage: add quirk for SMI SM3350 (bsc#1120902).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).\n- usb: xhci: fix \u0027broken_suspend\u0027 placement in struct xchi_hcd (bsc#1119086).\n- veth: set peer GSO values (bsc#1051510).\n- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n- vfio: ccw: process ssch with interrupts disabled (git-fixes).\n- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).\n- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).\n- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).\n- vhost: log dirty page correctly (networking-stable-19_01_26).\n- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).\n- vhost/vsock: fix uninitialized vhost_vsock-\u003eguest_cid (bsc#1051510).\n- video: clps711x-fb: release disp device node in probe() (bsc#1051510).\n- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).\n- virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).\n- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).\n- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).\n- virtio/s390: avoid race on vcdev-\u003econfig (git-fixes).\n- virtio/s390: fix race in ccw_io_helper() (git-fixes).\n- vmbus: fix subchannel removal (bsc#1127578).\n- vmbus: keep pointer to ring buffer page (bsc#1127578).\n- vmbus: pass channel to hv_process_channel_removal (bsc#1127578).\n- vmbus: split ring buffer allocation from open (bsc#1127578).\n- VMCI: Support upto 64-bit PPNs (bsc#1127286).\n- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).\n- vsock: Send reset control packet when socket is partially bound (networking-stable-19_01_04).\n- vt: invoke notifier on screen size change (bsc#1051510).\n- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).\n- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling gro_cells_receive() (git-fixes).\n- vxlan: update skb dst pmtu on tx path (bsc#1123456).\n- w90p910_ether: remove incorrect __init annotation (bsc#1051510).\n- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).\n- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/a.out: Clear the dump structure initially (bsc#1114279).\n- x86/apic: Provide apic_ack_irq() (bsc#1122822).\n- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).\n- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).\n- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).\n- x86/bugs: Add AMD\u0027s variant of SSB_NO (bsc#1114279).\n- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).\n- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).\n- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).\n- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).\n- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).\n- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).\n- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).\n- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).\n- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).\n- x86/vdso: Remove obsolete \u0027fake section table\u0027 reservation (bsc#1114279).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).\n- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).\n- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: fix dom0 boot on huge systems (bsc#1127836).\n- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).\n- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).\n- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).\n- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).\n- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).\n- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).\n- yama: Check for pid death before checking ancestry (bsc#1051510).\n- yam: fix a missing-check bug (bsc#1051510).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).\n- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-785,SUSE-SLE-Module-Public-Cloud-15-2019-785", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0785-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0785-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0785-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050252", "url": "https://bugzilla.suse.com/1050252" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1054610", "url": "https://bugzilla.suse.com/1054610" }, { "category": "self", "summary": "SUSE Bug 1055121", "url": "https://bugzilla.suse.com/1055121" }, { "category": "self", "summary": "SUSE Bug 1056658", "url": "https://bugzilla.suse.com/1056658" }, { "category": "self", "summary": "SUSE Bug 1056662", "url": "https://bugzilla.suse.com/1056662" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1063638", "url": "https://bugzilla.suse.com/1063638" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1070995", "url": "https://bugzilla.suse.com/1070995" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1084216", "url": "https://bugzilla.suse.com/1084216" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1088133", "url": "https://bugzilla.suse.com/1088133" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098382", "url": "https://bugzilla.suse.com/1098382" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106434", "url": "https://bugzilla.suse.com/1106434" }, { "category": "self", "summary": "SUSE Bug 1106811", "url": "https://bugzilla.suse.com/1106811" }, { "category": "self", "summary": "SUSE Bug 1107078", "url": "https://bugzilla.suse.com/1107078" }, { "category": "self", "summary": "SUSE Bug 1107665", "url": "https://bugzilla.suse.com/1107665" }, { "category": "self", "summary": "SUSE Bug 1108101", "url": "https://bugzilla.suse.com/1108101" }, { "category": "self", "summary": "SUSE Bug 1108870", "url": "https://bugzilla.suse.com/1108870" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1110096", "url": "https://bugzilla.suse.com/1110096" }, { "category": "self", "summary": "SUSE Bug 1110705", "url": "https://bugzilla.suse.com/1110705" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1113042", "url": "https://bugzilla.suse.com/1113042" }, { "category": "self", "summary": "SUSE Bug 1113712", "url": "https://bugzilla.suse.com/1113712" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113939", "url": "https://bugzilla.suse.com/1113939" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114585", "url": "https://bugzilla.suse.com/1114585" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117155", "url": "https://bugzilla.suse.com/1117155" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1118338", "url": "https://bugzilla.suse.com/1118338" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119086", "url": "https://bugzilla.suse.com/1119086" }, { "category": "self", "summary": "SUSE Bug 1119766", "url": "https://bugzilla.suse.com/1119766" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120008", "url": "https://bugzilla.suse.com/1120008" }, { "category": "self", "summary": "SUSE Bug 1120318", "url": "https://bugzilla.suse.com/1120318" }, { "category": "self", "summary": "SUSE Bug 1120601", "url": "https://bugzilla.suse.com/1120601" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120854", "url": "https://bugzilla.suse.com/1120854" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1120909", "url": "https://bugzilla.suse.com/1120909" }, { "category": "self", "summary": "SUSE Bug 1120955", "url": "https://bugzilla.suse.com/1120955" }, { "category": "self", "summary": "SUSE Bug 1121317", "url": "https://bugzilla.suse.com/1121317" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1121789", "url": "https://bugzilla.suse.com/1121789" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122019", "url": "https://bugzilla.suse.com/1122019" }, { "category": "self", "summary": "SUSE Bug 1122192", "url": "https://bugzilla.suse.com/1122192" }, { "category": "self", "summary": "SUSE Bug 1122324", "url": "https://bugzilla.suse.com/1122324" }, { "category": "self", "summary": "SUSE Bug 1122554", "url": "https://bugzilla.suse.com/1122554" }, { "category": "self", "summary": "SUSE Bug 1122662", "url": "https://bugzilla.suse.com/1122662" }, { "category": "self", "summary": "SUSE Bug 1122764", "url": "https://bugzilla.suse.com/1122764" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122822", "url": "https://bugzilla.suse.com/1122822" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1122927", "url": "https://bugzilla.suse.com/1122927" }, { "category": "self", "summary": "SUSE Bug 1122944", "url": "https://bugzilla.suse.com/1122944" }, { "category": "self", "summary": "SUSE Bug 1122971", "url": "https://bugzilla.suse.com/1122971" }, { "category": "self", "summary": "SUSE Bug 1122982", "url": "https://bugzilla.suse.com/1122982" }, { "category": "self", "summary": "SUSE Bug 1123060", "url": "https://bugzilla.suse.com/1123060" }, { "category": "self", "summary": "SUSE Bug 1123061", "url": "https://bugzilla.suse.com/1123061" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1123317", "url": "https://bugzilla.suse.com/1123317" }, { "category": "self", "summary": "SUSE Bug 1123348", "url": "https://bugzilla.suse.com/1123348" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE Bug 1123456", "url": "https://bugzilla.suse.com/1123456" }, { "category": "self", "summary": "SUSE Bug 1123538", "url": "https://bugzilla.suse.com/1123538" }, { "category": "self", "summary": "SUSE Bug 1123697", "url": "https://bugzilla.suse.com/1123697" }, { "category": "self", "summary": "SUSE Bug 1123882", "url": "https://bugzilla.suse.com/1123882" }, { "category": "self", "summary": "SUSE Bug 1123933", "url": "https://bugzilla.suse.com/1123933" }, { "category": "self", "summary": "SUSE Bug 1124055", "url": "https://bugzilla.suse.com/1124055" }, { "category": "self", "summary": "SUSE Bug 1124204", "url": "https://bugzilla.suse.com/1124204" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124579", "url": "https://bugzilla.suse.com/1124579" }, { "category": "self", "summary": "SUSE Bug 1124589", "url": "https://bugzilla.suse.com/1124589" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1124969", "url": "https://bugzilla.suse.com/1124969" }, { "category": "self", "summary": "SUSE Bug 1124974", "url": "https://bugzilla.suse.com/1124974" }, { "category": "self", "summary": "SUSE Bug 1124975", "url": "https://bugzilla.suse.com/1124975" }, { "category": "self", "summary": "SUSE Bug 1124976", "url": "https://bugzilla.suse.com/1124976" }, { "category": "self", "summary": "SUSE Bug 1124978", "url": "https://bugzilla.suse.com/1124978" }, { "category": "self", "summary": "SUSE Bug 1124979", "url": "https://bugzilla.suse.com/1124979" }, { "category": "self", "summary": "SUSE Bug 1124980", "url": "https://bugzilla.suse.com/1124980" }, { "category": "self", "summary": "SUSE Bug 1124981", "url": "https://bugzilla.suse.com/1124981" }, { "category": "self", "summary": "SUSE Bug 1124982", "url": "https://bugzilla.suse.com/1124982" }, { "category": "self", "summary": "SUSE Bug 1124984", "url": "https://bugzilla.suse.com/1124984" }, { "category": "self", "summary": "SUSE Bug 1124985", "url": "https://bugzilla.suse.com/1124985" }, { "category": "self", "summary": "SUSE Bug 1125109", "url": "https://bugzilla.suse.com/1125109" }, { "category": "self", "summary": "SUSE Bug 1125125", "url": "https://bugzilla.suse.com/1125125" }, { "category": "self", "summary": "SUSE Bug 1125252", "url": "https://bugzilla.suse.com/1125252" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125614", "url": "https://bugzilla.suse.com/1125614" }, { "category": "self", "summary": "SUSE Bug 1125728", "url": "https://bugzilla.suse.com/1125728" }, { "category": "self", "summary": "SUSE Bug 1125780", "url": "https://bugzilla.suse.com/1125780" }, { "category": "self", "summary": "SUSE Bug 1125797", "url": "https://bugzilla.suse.com/1125797" }, { "category": "self", "summary": "SUSE Bug 1125799", "url": "https://bugzilla.suse.com/1125799" }, { "category": "self", "summary": "SUSE Bug 1125800", "url": "https://bugzilla.suse.com/1125800" }, { "category": "self", "summary": "SUSE Bug 1125907", "url": "https://bugzilla.suse.com/1125907" }, { "category": "self", "summary": "SUSE Bug 1125947", "url": "https://bugzilla.suse.com/1125947" }, { "category": "self", "summary": "SUSE Bug 1126131", "url": "https://bugzilla.suse.com/1126131" }, { "category": "self", "summary": "SUSE Bug 1126209", "url": "https://bugzilla.suse.com/1126209" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126393", "url": "https://bugzilla.suse.com/1126393" }, { "category": "self", "summary": "SUSE Bug 1126476", "url": "https://bugzilla.suse.com/1126476" }, { "category": "self", "summary": "SUSE Bug 1126480", "url": "https://bugzilla.suse.com/1126480" }, { "category": "self", "summary": "SUSE Bug 1126481", "url": "https://bugzilla.suse.com/1126481" }, { "category": "self", "summary": "SUSE Bug 1126488", "url": "https://bugzilla.suse.com/1126488" }, { "category": "self", "summary": "SUSE Bug 1126495", "url": "https://bugzilla.suse.com/1126495" }, { "category": "self", "summary": "SUSE Bug 1126555", "url": "https://bugzilla.suse.com/1126555" }, { "category": "self", "summary": "SUSE Bug 1126579", "url": "https://bugzilla.suse.com/1126579" }, { "category": "self", "summary": "SUSE Bug 1126789", "url": "https://bugzilla.suse.com/1126789" }, { "category": "self", "summary": "SUSE Bug 1126790", "url": "https://bugzilla.suse.com/1126790" }, { "category": "self", "summary": "SUSE Bug 1126802", "url": "https://bugzilla.suse.com/1126802" }, { "category": "self", "summary": "SUSE Bug 1126803", "url": "https://bugzilla.suse.com/1126803" }, { "category": "self", "summary": "SUSE Bug 1126804", "url": "https://bugzilla.suse.com/1126804" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1126806", "url": "https://bugzilla.suse.com/1126806" }, { "category": "self", "summary": "SUSE Bug 1126807", "url": "https://bugzilla.suse.com/1126807" }, { "category": "self", "summary": "SUSE Bug 1127042", "url": "https://bugzilla.suse.com/1127042" }, { "category": "self", "summary": "SUSE Bug 1127062", "url": "https://bugzilla.suse.com/1127062" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127154", "url": "https://bugzilla.suse.com/1127154" }, { "category": "self", "summary": "SUSE Bug 1127285", "url": "https://bugzilla.suse.com/1127285" }, { "category": "self", "summary": "SUSE Bug 1127286", "url": "https://bugzilla.suse.com/1127286" }, { "category": "self", "summary": "SUSE Bug 1127307", "url": "https://bugzilla.suse.com/1127307" }, { "category": "self", "summary": "SUSE Bug 1127363", "url": "https://bugzilla.suse.com/1127363" }, { "category": "self", "summary": "SUSE Bug 1127493", "url": "https://bugzilla.suse.com/1127493" }, { "category": "self", "summary": "SUSE Bug 1127494", "url": "https://bugzilla.suse.com/1127494" }, { "category": "self", "summary": "SUSE Bug 1127495", "url": "https://bugzilla.suse.com/1127495" }, { "category": "self", "summary": "SUSE Bug 1127496", "url": "https://bugzilla.suse.com/1127496" }, { "category": "self", "summary": "SUSE Bug 1127497", "url": "https://bugzilla.suse.com/1127497" }, { "category": "self", "summary": "SUSE Bug 1127498", "url": "https://bugzilla.suse.com/1127498" }, { "category": "self", "summary": "SUSE Bug 1127534", "url": "https://bugzilla.suse.com/1127534" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127567", "url": "https://bugzilla.suse.com/1127567" }, { "category": "self", "summary": "SUSE Bug 1127578", "url": "https://bugzilla.suse.com/1127578" }, { "category": "self", "summary": "SUSE Bug 1127595", "url": "https://bugzilla.suse.com/1127595" }, { "category": "self", "summary": "SUSE Bug 1127603", "url": "https://bugzilla.suse.com/1127603" }, { "category": "self", "summary": "SUSE Bug 1127682", "url": "https://bugzilla.suse.com/1127682" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127750", "url": "https://bugzilla.suse.com/1127750" }, { "category": "self", "summary": "SUSE Bug 1127836", "url": "https://bugzilla.suse.com/1127836" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128094", "url": "https://bugzilla.suse.com/1128094" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128351", "url": "https://bugzilla.suse.com/1128351" }, { "category": "self", "summary": "SUSE Bug 1128451", "url": "https://bugzilla.suse.com/1128451" }, { "category": "self", "summary": "SUSE Bug 1128895", "url": "https://bugzilla.suse.com/1128895" }, { "category": "self", "summary": "SUSE Bug 1129046", "url": "https://bugzilla.suse.com/1129046" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129163", "url": "https://bugzilla.suse.com/1129163" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129181", "url": "https://bugzilla.suse.com/1129181" }, { "category": "self", "summary": "SUSE Bug 1129182", "url": "https://bugzilla.suse.com/1129182" }, { "category": "self", "summary": "SUSE Bug 1129183", "url": "https://bugzilla.suse.com/1129183" }, { "category": "self", "summary": "SUSE Bug 1129184", "url": "https://bugzilla.suse.com/1129184" }, { "category": "self", "summary": "SUSE Bug 1129205", "url": "https://bugzilla.suse.com/1129205" }, { "category": "self", "summary": "SUSE Bug 1129281", "url": "https://bugzilla.suse.com/1129281" }, { "category": "self", "summary": "SUSE Bug 1129284", "url": "https://bugzilla.suse.com/1129284" }, { "category": "self", "summary": "SUSE Bug 1129285", "url": "https://bugzilla.suse.com/1129285" }, { "category": "self", "summary": "SUSE Bug 1129291", "url": "https://bugzilla.suse.com/1129291" }, { "category": "self", "summary": "SUSE Bug 1129292", "url": "https://bugzilla.suse.com/1129292" }, { "category": "self", "summary": "SUSE Bug 1129293", "url": "https://bugzilla.suse.com/1129293" }, { "category": "self", "summary": "SUSE Bug 1129294", "url": "https://bugzilla.suse.com/1129294" }, { "category": "self", "summary": "SUSE Bug 1129295", "url": "https://bugzilla.suse.com/1129295" }, { "category": "self", "summary": "SUSE Bug 1129296", "url": "https://bugzilla.suse.com/1129296" }, { "category": "self", "summary": "SUSE Bug 1129326", "url": "https://bugzilla.suse.com/1129326" }, { "category": "self", "summary": "SUSE Bug 1129327", "url": "https://bugzilla.suse.com/1129327" }, { "category": "self", "summary": "SUSE Bug 1129330", "url": "https://bugzilla.suse.com/1129330" }, { "category": "self", "summary": "SUSE Bug 1129363", "url": "https://bugzilla.suse.com/1129363" }, { "category": "self", "summary": "SUSE Bug 1129366", "url": "https://bugzilla.suse.com/1129366" }, { "category": "self", "summary": "SUSE Bug 1129497", "url": "https://bugzilla.suse.com/1129497" }, { "category": "self", "summary": "SUSE Bug 1129519", "url": "https://bugzilla.suse.com/1129519" }, { "category": "self", "summary": "SUSE Bug 1129543", "url": "https://bugzilla.suse.com/1129543" }, { "category": "self", "summary": "SUSE Bug 1129547", "url": "https://bugzilla.suse.com/1129547" }, { "category": "self", "summary": "SUSE Bug 1129551", "url": "https://bugzilla.suse.com/1129551" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129625", "url": "https://bugzilla.suse.com/1129625" }, { "category": "self", "summary": "SUSE Bug 1129664", "url": "https://bugzilla.suse.com/1129664" }, { "category": "self", "summary": "SUSE Bug 1129739", "url": "https://bugzilla.suse.com/1129739" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 824948", "url": "https://bugzilla.suse.com/824948" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20669 page", "url": "https://www.suse.com/security/cve/CVE-2018-20669/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7308 page", "url": "https://www.suse.com/security/cve/CVE-2019-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8980 page", "url": "https://www.suse.com/security/cve/CVE-2019-8980/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-03-28T10:19:30Z", "generator": { "date": "2019-03-28T10:19:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0785-1", "initial_release_date": "2019-03-28T10:19:30Z", "revision_history": [ { "date": "2019-03-28T10:19:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-5.24.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-5.24.1.noarch", "product_id": "kernel-devel-azure-4.12.14-5.24.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-5.24.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-5.24.1.noarch", "product_id": "kernel-source-azure-4.12.14-5.24.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-azure-4.12.14-5.24.1.x86_64", "product_id": "kernel-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-5.24.1.x86_64", "product_id": "kernel-azure-base-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-5.24.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-5.24.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-azure-livepatch-4.12.14-5.24.1.x86_64", "product_id": "kernel-azure-livepatch-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-5.24.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "reiserfs-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "reiserfs-kmp-azure-4.12.14-5.24.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-5.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-5.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-5.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-5.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-5.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-5.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-5.24.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-5.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-5.24.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-5.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-5.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-5.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20669" } ], "notes": [ { "category": "general", "text": "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20669", "url": "https://www.suse.com/security/cve/CVE-2018-20669" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2018-20669", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "important" } ], "title": "CVE-2018-20669" }, { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-3819" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "important" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "important" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7308" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7308", "url": "https://www.suse.com/security/cve/CVE-2019-7308" }, { "category": "external", "summary": "SUSE Bug 1124055 for CVE-2019-7308", "url": "https://bugzilla.suse.com/1124055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "important" } ], "title": "CVE-2019-7308" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "important" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-8980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8980" } ], "notes": [ { "category": "general", "text": "A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8980", "url": "https://www.suse.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "SUSE Bug 1126209 for CVE-2019-8980", "url": "https://bugzilla.suse.com/1126209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "low" } ], "title": "CVE-2019-8980" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
suse-su-2019:0470-1
Vulnerability from csaf_suse
Published
2019-02-22 12:47
Modified
2019-02-22 12:47
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 realtime kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2017-18249: Fixed tracking on allocated nid in the add_free_nid function fs/f2fs/node.c, which previously allowed local users to cause a denial of service (bnc#1087036).
- CVE-2019-3459: Fixed remote heap address information leak in use of l2cap_get_conf_opt (bnc#1120758).
- CVE-2019-3460: Fixed remote data leak in multiple location in the function l2cap_parse_conf_rsp (bnc#1120758).
The following non-security bugs were fixed:
- Disable MSI also when pcie-octeon.pcie_disable on (bnc#1012382).
- Fix problem with sharetransport= and NFSv4 (bsc#1114893).
- Revert 'bs-upload-kernel: do not set %opensuse_bs' This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.
- Yama: Check for pid death before checking ancestry (bnc#1012382).
- acpi / processor: Fix the return value of acpi_processor_ids_walk() (git fixes (acpi)).
- acpi/nfit: Block function zero DSMs (bsc#1123321).
- acpi/nfit: Fix command-supported detection (bsc#1123323).
- acpi: power: Skip duplicate power resource references in _PRx (bnc#1012382).
- alsa: bebob: fix model-id of unit for Apogee Ensemble (bnc#1012382).
- alsa: hda/realtek - Disable headset Mic VREF for headset mode of ALC225 (bnc#1012382).
- arm64/kvm: consistently handle host HCR_EL2 flags (bnc#1012382).
- arm64: Do not trap host pointer auth use to EL2 (bnc#1012382).
- arm64: perf: set suppress_bind_attrs flag to true (bnc#1012382).
- ata: Fix racy link clearance (bsc#1107866).
- block/loop: Use global lock for ioctl() operation (bnc#1012382).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (Git-fixes).
- Btrfs: tree-check: reduce stack consumption in check_dir_item (bnc#1012382).
- Btrfs: tree-checker: Check level for leaves and nodes (bnc#1012382).
- Btrfs: tree-checker: Do not check max block group size as current max chunk size limit is unreliable (fixes for bnc#1012382 bsc#1102875 bsc#1102877 bsc#1102879 bsc#1102882 bsc#1102896).
- Btrfs: tree-checker: Fix misleading group system information (bnc#1012382).
- Btrfs: validate type when reading a chunk (bnc#1012382).
- Btrfs: wait on ordered extents on abort cleanup (bnc#1012382).
- can: gw: ensure DLC boundaries after CAN frame modification (bnc#1012382).
- cifs: Do not hide EINTR after sending network packets (bnc#1012382).
- cifs: Fix potential OOB access of lock element array (bnc#1012382).
- clk: imx6q: reset exclusive gates on init (bnc#1012382).
- crypto: authenc - fix parsing key with misaligned rta_len (bnc#1012382).
- crypto: authencesn - Avoid twice completion call in decrypt path (bnc#1012382).
- crypto: cts - fix crash on short inputs (bnc#1012382).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- dm crypt: add cryptographic data integrity protection (authenticated encryption) (Git-fixes).
- dm crypt: factor IV constructor out to separate function (Git-fixes).
- dm crypt: fix crash by adding missing check for auth key size (git-fixes).
- dm crypt: fix error return code in crypt_ctr() (git-fixes).
- dm crypt: fix memory leak in crypt_ctr_cipher_old() (git-fixes).
- dm crypt: introduce new format of cipher with 'capi:' prefix (Git-fixes).
- dm crypt: wipe kernel key copy after IV initialization (Git-fixes).
- dm kcopyd: Fix bug causing workqueue stalls (bnc#1012382).
- dm snapshot: Fix excessive memory usage and workqueue stalls (bnc#1012382).
- dm: do not allow readahead to limit IO size (git fixes (readahead)).
- e1000e: allow non-monotonic SYSTIM readings (bnc#1012382).
- edac: Raise the maximum number of memory controllers (bsc#1120722).
- efi/libstub/arm64: Use hidden attribute for struct screen_info reference (bsc#1122650).
- ext4: Fix crash during online resizing (bsc#1122779).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bnc#1012382).
- f2fs: Add sanity_check_inode() function (bnc#1012382).
- f2fs: avoid unneeded loop in build_sit_entries (bnc#1012382).
- f2fs: check blkaddr more accuratly before issue a bio (bnc#1012382).
- f2fs: clean up argument of recover_data (bnc#1012382).
- f2fs: clean up with is_valid_blkaddr() (bnc#1012382).
- f2fs: detect wrong layout (bnc#1012382).
- f2fs: enhance sanity_check_raw_super() to avoid potential overflow (bnc#1012382).
- f2fs: factor out fsync inode entry operations (bnc#1012382).
- f2fs: fix inode cache leak (bnc#1012382).
- f2fs: fix invalid memory access (bnc#1012382).
- f2fs: fix missing up_read (bnc#1012382).
- f2fs: fix to avoid reading out encrypted data in page cache (bnc#1012382).
- f2fs: fix to convert inline directory correctly (bnc#1012382).
- f2fs: fix to determine start_cp_addr by sbi->cur_cp_pack (bnc#1012382).
- f2fs: fix to do sanity check with block address in main area (bnc#1012382).
- f2fs: fix to do sanity check with block address in main area v2 (bnc#1012382).
- f2fs: fix to do sanity check with cp_pack_start_sum (bnc#1012382).
- f2fs: fix to do sanity check with node footer and iblocks (bnc#1012382).
- f2fs: fix to do sanity check with reserved blkaddr of inline inode (bnc#1012382).
- f2fs: fix to do sanity check with secs_per_zone (bnc#1012382).
- f2fs: fix to do sanity check with user_block_count (bnc#1012382).
- f2fs: fix validation of the block count in sanity_check_raw_super (bnc#1012382).
- f2fs: free meta pages if sanity check for ckpt is failed (bnc#1012382).
- f2fs: give -EINVAL for norecovery and rw mount (bnc#1012382).
- f2fs: introduce and spread verify_blkaddr (bnc#1012382).
- f2fs: introduce get_checkpoint_version for cleanup (bnc#1012382).
- f2fs: move sanity checking of cp into get_valid_checkpoint (bnc#1012382).
- f2fs: not allow to write illegal blkaddr (bnc#1012382).
- f2fs: put directory inodes before checkpoint in roll-forward recovery (bnc#1012382).
- f2fs: remove an obsolete variable (bnc#1012382).
- f2fs: return error during fill_super (bnc#1012382).
- f2fs: sanity check on sit entry (bnc#1012382).
- f2fs: use crc and cp version to determine roll-forward recovery (bnc#1012382).
- gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB (Git-fixes).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bnc#1012382).
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (bnc#1012382).
- ipmi:ssif: Fix handling of multi-part return messages (bnc#1012382).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (bnc#1012382).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (bnc#1012382).
- ipv6: fix kernel-infoleak in ipv6_local_error() (bnc#1012382).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bnc#1012382).
- kabi: reorder new slabinfo fields in struct kmem_cache_node (bnc#1116653).
- kconfig: fix file name and line number of warn_ignored_character() (bnc#1012382).
- kconfig: fix memory leak when EOF is encountered in quotation (bnc#1012382).
- loop: Fix double mutex_unlock(&loop_ctl_mutex) in loop_control_ioctl() (bnc#1012382).
- loop: Fold __loop_release into loop_release (bnc#1012382).
- loop: Get rid of loop_index_mutex (bnc#1012382).
- lsm: Check for NULL cred-security on free (bnc#1012382).
- md: batch flush requests (bsc#1119680).
- media: em28xx: Fix misplaced reset of dev->v4l::field_count (bnc#1012382).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bnc#1012382).
- media: vb2: be sure to unlock mutex on errors (bnc#1012382).
- media: vb2: vb2_mmap: move lock up (bnc#1012382).
- media: vivid: fix error handling of kthread_run (bnc#1012382).
- media: vivid: set min width/height to a value > 0 (bnc#1012382).
- mfd: tps6586x: Handle interrupts on suspend (bnc#1012382).
- mips: SiByte: Enable swiotlb for SWARM, LittleSur and BigSur (bnc#1012382).
- mips: fix n32 compat_ipc_parse_version (bnc#1012382).
- mm, proc: be more verbose about unstable VMA flags in /proc/<pid>/smaps (bnc#1012382).
- mm, slab: faster active and free stats (bsc#1116653, VM Performance).
- mm, slab: maintain total slab count instead of active count (bsc#1116653, VM Performance).
- mm/page-writeback.c: do not break integrity writeback on ->writepage() error (bnc#1012382).
- mm/slab: improve performance of gathering slabinfo stats (bsc#1116653, VM Performance).
- mm: only report isolation failures when offlining memory (generic hotplug debugability).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bnc#1012382).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (bnc#1012382).
- net: call sk_dst_reset when set SO_DONTROUTE (bnc#1012382).
- net: speed up skb_rbtree_purge() (bnc#1012382).
- ocfs2: fix panic due to unrecovered local alloc (bnc#1012382).
- omap2fb: Fix stack memory disclosure (bsc#1106929)
- packet: Do not leak dev refcounts on error exit (bnc#1012382).
- pci: altera: Check link status before retrain link (bnc#1012382).
- pci: altera: Fix altera_pcie_link_is_up() (bnc#1012382).
- pci: altera: Move retrain from fixup to altera_pcie_host_init() (bnc#1012382).
- pci: altera: Poll for link training status after retraining the link (bnc#1012382).
- pci: altera: Poll for link up status after retraining the link (bnc#1012382).
- pci: altera: Reorder read/write functions (bnc#1012382).
- pci: altera: Rework config accessors for use without a struct pci_bus (bnc#1012382).
- perf intel-pt: Fix error with config term 'pt=0' (bnc#1012382).
- perf parse-events: Fix unchecked usage of strncpy() (bnc#1012382).
- perf svghelper: Fix unchecked usage of strncpy() (bnc#1012382).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bnc#1012382).
- powerpc, hotplug: Avoid to touch non-existent cpumasks (bsc#1109695).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc/pseries/cpuidle: Fix preempt warning (bnc#1012382).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- proc: Remove empty line in /proc/self/status (bnc#1012382 bsc#1094823).
- pstore/ram: Do not treat empty buffers as valid (bnc#1012382).
- r8169: Add support for new Realtek Ethernet (bnc#1012382).
- scsi: megaraid: fix out-of-bound array accesses (bnc#1012382).
- scsi: sd: Fix cache_type_store() (bnc#1012382).
- scsi: target: use consistent left-aligned ASCII INQUIRY data (bnc#1012382).
- sctp: allocate sctp_sockaddr_entry with kzalloc (bnc#1012382).
- selinux: fix GPF on invalid policy (bnc#1012382).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (bnc#1012382).
- sunrpc: handle ENOMEM in rpcb_getport_async (bnc#1012382).
- sysfs: Disable lockdep for driver bind/unbind files (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_doit (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bnc#1012382).
- tty/ldsem: Wake up readers after timed out down_write() (bnc#1012382).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bnc#1012382).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bnc#1012382).
- usb: storage: add quirk for SMI SM3350 (bnc#1012382).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bnc#1012382).
- writeback: do not decrement wb->refcnt if !wb->bdi (git fixes (writeback)).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1106105).
Patchnames
SUSE-2019-470,SUSE-SLE-RT-12-SP3-2019-470
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 realtime kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2017-18249: Fixed tracking on allocated nid in the add_free_nid function fs/f2fs/node.c, which previously allowed local users to cause a denial of service (bnc#1087036).\n- CVE-2019-3459: Fixed remote heap address information leak in use of l2cap_get_conf_opt (bnc#1120758).\n- CVE-2019-3460: Fixed remote data leak in multiple location in the function l2cap_parse_conf_rsp (bnc#1120758).\n\nThe following non-security bugs were fixed:\n\n- Disable MSI also when pcie-octeon.pcie_disable on (bnc#1012382).\n- Fix problem with sharetransport= and NFSv4 (bsc#1114893).\n- Revert \u0027bs-upload-kernel: do not set %opensuse_bs\u0027 This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.\n- Yama: Check for pid death before checking ancestry (bnc#1012382).\n- acpi / processor: Fix the return value of acpi_processor_ids_walk() (git fixes (acpi)).\n- acpi/nfit: Block function zero DSMs (bsc#1123321).\n- acpi/nfit: Fix command-supported detection (bsc#1123323).\n- acpi: power: Skip duplicate power resource references in _PRx (bnc#1012382).\n- alsa: bebob: fix model-id of unit for Apogee Ensemble (bnc#1012382).\n- alsa: hda/realtek - Disable headset Mic VREF for headset mode of ALC225 (bnc#1012382).\n- arm64/kvm: consistently handle host HCR_EL2 flags (bnc#1012382).\n- arm64: Do not trap host pointer auth use to EL2 (bnc#1012382).\n- arm64: perf: set suppress_bind_attrs flag to true (bnc#1012382).\n- ata: Fix racy link clearance (bsc#1107866).\n- block/loop: Use global lock for ioctl() operation (bnc#1012382).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (Git-fixes).\n- Btrfs: tree-check: reduce stack consumption in check_dir_item (bnc#1012382).\n- Btrfs: tree-checker: Check level for leaves and nodes (bnc#1012382).\n- Btrfs: tree-checker: Do not check max block group size as current max chunk size limit is unreliable (fixes for bnc#1012382 bsc#1102875 bsc#1102877 bsc#1102879 bsc#1102882 bsc#1102896).\n- Btrfs: tree-checker: Fix misleading group system information (bnc#1012382).\n- Btrfs: validate type when reading a chunk (bnc#1012382).\n- Btrfs: wait on ordered extents on abort cleanup (bnc#1012382).\n- can: gw: ensure DLC boundaries after CAN frame modification (bnc#1012382).\n- cifs: Do not hide EINTR after sending network packets (bnc#1012382).\n- cifs: Fix potential OOB access of lock element array (bnc#1012382).\n- clk: imx6q: reset exclusive gates on init (bnc#1012382).\n- crypto: authenc - fix parsing key with misaligned rta_len (bnc#1012382).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bnc#1012382).\n- crypto: cts - fix crash on short inputs (bnc#1012382).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- dm crypt: add cryptographic data integrity protection (authenticated encryption) (Git-fixes).\n- dm crypt: factor IV constructor out to separate function (Git-fixes).\n- dm crypt: fix crash by adding missing check for auth key size (git-fixes).\n- dm crypt: fix error return code in crypt_ctr() (git-fixes).\n- dm crypt: fix memory leak in crypt_ctr_cipher_old() (git-fixes).\n- dm crypt: introduce new format of cipher with \u0027capi:\u0027 prefix (Git-fixes).\n- dm crypt: wipe kernel key copy after IV initialization (Git-fixes).\n- dm kcopyd: Fix bug causing workqueue stalls (bnc#1012382).\n- dm snapshot: Fix excessive memory usage and workqueue stalls (bnc#1012382).\n- dm: do not allow readahead to limit IO size (git fixes (readahead)).\n- e1000e: allow non-monotonic SYSTIM readings (bnc#1012382).\n- edac: Raise the maximum number of memory controllers (bsc#1120722).\n- efi/libstub/arm64: Use hidden attribute for struct screen_info reference (bsc#1122650).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bnc#1012382).\n- f2fs: Add sanity_check_inode() function (bnc#1012382).\n- f2fs: avoid unneeded loop in build_sit_entries (bnc#1012382).\n- f2fs: check blkaddr more accuratly before issue a bio (bnc#1012382).\n- f2fs: clean up argument of recover_data (bnc#1012382).\n- f2fs: clean up with is_valid_blkaddr() (bnc#1012382).\n- f2fs: detect wrong layout (bnc#1012382).\n- f2fs: enhance sanity_check_raw_super() to avoid potential overflow (bnc#1012382).\n- f2fs: factor out fsync inode entry operations (bnc#1012382).\n- f2fs: fix inode cache leak (bnc#1012382).\n- f2fs: fix invalid memory access (bnc#1012382).\n- f2fs: fix missing up_read (bnc#1012382).\n- f2fs: fix to avoid reading out encrypted data in page cache (bnc#1012382).\n- f2fs: fix to convert inline directory correctly (bnc#1012382).\n- f2fs: fix to determine start_cp_addr by sbi-\u003ecur_cp_pack (bnc#1012382).\n- f2fs: fix to do sanity check with block address in main area (bnc#1012382).\n- f2fs: fix to do sanity check with block address in main area v2 (bnc#1012382).\n- f2fs: fix to do sanity check with cp_pack_start_sum (bnc#1012382).\n- f2fs: fix to do sanity check with node footer and iblocks (bnc#1012382).\n- f2fs: fix to do sanity check with reserved blkaddr of inline inode (bnc#1012382).\n- f2fs: fix to do sanity check with secs_per_zone (bnc#1012382).\n- f2fs: fix to do sanity check with user_block_count (bnc#1012382).\n- f2fs: fix validation of the block count in sanity_check_raw_super (bnc#1012382).\n- f2fs: free meta pages if sanity check for ckpt is failed (bnc#1012382).\n- f2fs: give -EINVAL for norecovery and rw mount (bnc#1012382).\n- f2fs: introduce and spread verify_blkaddr (bnc#1012382).\n- f2fs: introduce get_checkpoint_version for cleanup (bnc#1012382).\n- f2fs: move sanity checking of cp into get_valid_checkpoint (bnc#1012382).\n- f2fs: not allow to write illegal blkaddr (bnc#1012382).\n- f2fs: put directory inodes before checkpoint in roll-forward recovery (bnc#1012382).\n- f2fs: remove an obsolete variable (bnc#1012382).\n- f2fs: return error during fill_super (bnc#1012382).\n- f2fs: sanity check on sit entry (bnc#1012382).\n- f2fs: use crc and cp version to determine roll-forward recovery (bnc#1012382).\n- gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB (Git-fixes).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bnc#1012382).\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (bnc#1012382).\n- ipmi:ssif: Fix handling of multi-part return messages (bnc#1012382).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (bnc#1012382).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (bnc#1012382).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (bnc#1012382).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bnc#1012382).\n- kabi: reorder new slabinfo fields in struct kmem_cache_node (bnc#1116653).\n- kconfig: fix file name and line number of warn_ignored_character() (bnc#1012382).\n- kconfig: fix memory leak when EOF is encountered in quotation (bnc#1012382).\n- loop: Fix double mutex_unlock(\u0026loop_ctl_mutex) in loop_control_ioctl() (bnc#1012382).\n- loop: Fold __loop_release into loop_release (bnc#1012382).\n- loop: Get rid of loop_index_mutex (bnc#1012382).\n- lsm: Check for NULL cred-security on free (bnc#1012382).\n- md: batch flush requests (bsc#1119680).\n- media: em28xx: Fix misplaced reset of dev-\u003ev4l::field_count (bnc#1012382).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bnc#1012382).\n- media: vb2: be sure to unlock mutex on errors (bnc#1012382).\n- media: vb2: vb2_mmap: move lock up (bnc#1012382).\n- media: vivid: fix error handling of kthread_run (bnc#1012382).\n- media: vivid: set min width/height to a value \u003e 0 (bnc#1012382).\n- mfd: tps6586x: Handle interrupts on suspend (bnc#1012382).\n- mips: SiByte: Enable swiotlb for SWARM, LittleSur and BigSur (bnc#1012382).\n- mips: fix n32 compat_ipc_parse_version (bnc#1012382).\n- mm, proc: be more verbose about unstable VMA flags in /proc/\u0026lt;pid\u003e/smaps (bnc#1012382).\n- mm, slab: faster active and free stats (bsc#1116653, VM Performance).\n- mm, slab: maintain total slab count instead of active count (bsc#1116653, VM Performance).\n- mm/page-writeback.c: do not break integrity writeback on -\u003ewritepage() error (bnc#1012382).\n- mm/slab: improve performance of gathering slabinfo stats (bsc#1116653, VM Performance).\n- mm: only report isolation failures when offlining memory (generic hotplug debugability).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bnc#1012382).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (bnc#1012382).\n- net: call sk_dst_reset when set SO_DONTROUTE (bnc#1012382).\n- net: speed up skb_rbtree_purge() (bnc#1012382).\n- ocfs2: fix panic due to unrecovered local alloc (bnc#1012382).\n- omap2fb: Fix stack memory disclosure (bsc#1106929)\n- packet: Do not leak dev refcounts on error exit (bnc#1012382).\n- pci: altera: Check link status before retrain link (bnc#1012382).\n- pci: altera: Fix altera_pcie_link_is_up() (bnc#1012382).\n- pci: altera: Move retrain from fixup to altera_pcie_host_init() (bnc#1012382).\n- pci: altera: Poll for link training status after retraining the link (bnc#1012382).\n- pci: altera: Poll for link up status after retraining the link (bnc#1012382).\n- pci: altera: Reorder read/write functions (bnc#1012382).\n- pci: altera: Rework config accessors for use without a struct pci_bus (bnc#1012382).\n- perf intel-pt: Fix error with config term \u0027pt=0\u0027 (bnc#1012382).\n- perf parse-events: Fix unchecked usage of strncpy() (bnc#1012382).\n- perf svghelper: Fix unchecked usage of strncpy() (bnc#1012382).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bnc#1012382).\n- powerpc, hotplug: Avoid to touch non-existent cpumasks (bsc#1109695).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc/pseries/cpuidle: Fix preempt warning (bnc#1012382).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- proc: Remove empty line in /proc/self/status (bnc#1012382 bsc#1094823).\n- pstore/ram: Do not treat empty buffers as valid (bnc#1012382).\n- r8169: Add support for new Realtek Ethernet (bnc#1012382).\n- scsi: megaraid: fix out-of-bound array accesses (bnc#1012382).\n- scsi: sd: Fix cache_type_store() (bnc#1012382).\n- scsi: target: use consistent left-aligned ASCII INQUIRY data (bnc#1012382).\n- sctp: allocate sctp_sockaddr_entry with kzalloc (bnc#1012382).\n- selinux: fix GPF on invalid policy (bnc#1012382).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (bnc#1012382).\n- sunrpc: handle ENOMEM in rpcb_getport_async (bnc#1012382).\n- sysfs: Disable lockdep for driver bind/unbind files (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bnc#1012382).\n- tty/ldsem: Wake up readers after timed out down_write() (bnc#1012382).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bnc#1012382).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bnc#1012382).\n- usb: storage: add quirk for SMI SM3350 (bnc#1012382).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bnc#1012382).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1106105).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-470,SUSE-SLE-RT-12-SP3-2019-470", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0470-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0470-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190470-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0470-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-February/005147.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1023175", "url": "https://bugzilla.suse.com/1023175" }, { "category": "self", "summary": "SUSE Bug 1087036", "url": "https://bugzilla.suse.com/1087036" }, { "category": "self", "summary": "SUSE Bug 1094823", "url": "https://bugzilla.suse.com/1094823" }, { "category": "self", "summary": "SUSE Bug 1102875", "url": "https://bugzilla.suse.com/1102875" }, { "category": "self", "summary": "SUSE Bug 1102877", "url": "https://bugzilla.suse.com/1102877" }, { "category": "self", "summary": "SUSE Bug 1102879", "url": "https://bugzilla.suse.com/1102879" }, { "category": "self", "summary": "SUSE Bug 1102882", "url": "https://bugzilla.suse.com/1102882" }, { "category": "self", "summary": "SUSE Bug 1102896", "url": "https://bugzilla.suse.com/1102896" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106929", "url": "https://bugzilla.suse.com/1106929" }, { "category": "self", "summary": "SUSE Bug 1107866", "url": "https://bugzilla.suse.com/1107866" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1116653", "url": "https://bugzilla.suse.com/1116653" }, { "category": "self", "summary": "SUSE Bug 1119680", "url": "https://bugzilla.suse.com/1119680" }, { "category": "self", "summary": "SUSE Bug 1120722", "url": "https://bugzilla.suse.com/1120722" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1122650", "url": "https://bugzilla.suse.com/1122650" }, { "category": "self", "summary": "SUSE Bug 1122651", "url": "https://bugzilla.suse.com/1122651" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1123321", "url": "https://bugzilla.suse.com/1123321" }, { "category": "self", "summary": "SUSE Bug 1123323", "url": "https://bugzilla.suse.com/1123323" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18249 page", "url": "https://www.suse.com/security/cve/CVE-2017-18249/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-02-22T12:47:15Z", "generator": { "date": "2019-02-22T12:47:15Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0470-1", "initial_release_date": "2019-02-22T12:47:15Z", "revision_history": [ { "date": "2019-02-22T12:47:15Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-rt-4.4.172-3.35.1.noarch", "product": { "name": "kernel-devel-rt-4.4.172-3.35.1.noarch", "product_id": "kernel-devel-rt-4.4.172-3.35.1.noarch" } }, { "category": "product_version", "name": "kernel-source-rt-4.4.172-3.35.1.noarch", "product": { "name": "kernel-source-rt-4.4.172-3.35.1.noarch", "product_id": "kernel-source-rt-4.4.172-3.35.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-rt-4.4.172-3.35.1.x86_64", "product": { "name": "cluster-md-kmp-rt-4.4.172-3.35.1.x86_64", "product_id": "cluster-md-kmp-rt-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-rt_debug-4.4.172-3.35.1.x86_64", "product": { "name": "cluster-md-kmp-rt_debug-4.4.172-3.35.1.x86_64", "product_id": "cluster-md-kmp-rt_debug-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt-4.4.172-3.35.1.x86_64", "product": { "name": "dlm-kmp-rt-4.4.172-3.35.1.x86_64", "product_id": "dlm-kmp-rt-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-rt_debug-4.4.172-3.35.1.x86_64", "product": { "name": "dlm-kmp-rt_debug-4.4.172-3.35.1.x86_64", "product_id": "dlm-kmp-rt_debug-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt-4.4.172-3.35.1.x86_64", "product": { "name": "gfs2-kmp-rt-4.4.172-3.35.1.x86_64", "product_id": "gfs2-kmp-rt-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-rt_debug-4.4.172-3.35.1.x86_64", "product": { "name": "gfs2-kmp-rt_debug-4.4.172-3.35.1.x86_64", "product_id": "gfs2-kmp-rt_debug-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-4.4.172-3.35.1.x86_64", "product": { "name": "kernel-rt-4.4.172-3.35.1.x86_64", "product_id": "kernel-rt-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-base-4.4.172-3.35.1.x86_64", "product": { "name": "kernel-rt-base-4.4.172-3.35.1.x86_64", "product_id": "kernel-rt-base-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-devel-4.4.172-3.35.1.x86_64", "product": { "name": "kernel-rt-devel-4.4.172-3.35.1.x86_64", "product_id": "kernel-rt-devel-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-extra-4.4.172-3.35.1.x86_64", "product": { "name": "kernel-rt-extra-4.4.172-3.35.1.x86_64", "product_id": "kernel-rt-extra-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt-kgraft-4.4.172-3.35.1.x86_64", "product": { "name": "kernel-rt-kgraft-4.4.172-3.35.1.x86_64", "product_id": "kernel-rt-kgraft-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-4.4.172-3.35.1.x86_64", "product": { "name": "kernel-rt_debug-4.4.172-3.35.1.x86_64", "product_id": "kernel-rt_debug-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-base-4.4.172-3.35.1.x86_64", "product": { "name": "kernel-rt_debug-base-4.4.172-3.35.1.x86_64", "product_id": "kernel-rt_debug-base-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-devel-4.4.172-3.35.1.x86_64", "product": { "name": "kernel-rt_debug-devel-4.4.172-3.35.1.x86_64", "product_id": "kernel-rt_debug-devel-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-extra-4.4.172-3.35.1.x86_64", "product": { "name": "kernel-rt_debug-extra-4.4.172-3.35.1.x86_64", "product_id": "kernel-rt_debug-extra-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-rt_debug-kgraft-4.4.172-3.35.1.x86_64", "product": { "name": "kernel-rt_debug-kgraft-4.4.172-3.35.1.x86_64", "product_id": "kernel-rt_debug-kgraft-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-rt-4.4.172-3.35.1.x86_64", "product": { "name": "kernel-syms-rt-4.4.172-3.35.1.x86_64", "product_id": "kernel-syms-rt-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt-4.4.172-3.35.1.x86_64", "product": { "name": "kselftests-kmp-rt-4.4.172-3.35.1.x86_64", "product_id": "kselftests-kmp-rt-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-rt_debug-4.4.172-3.35.1.x86_64", "product": { "name": "kselftests-kmp-rt_debug-4.4.172-3.35.1.x86_64", "product_id": "kselftests-kmp-rt_debug-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt-4.4.172-3.35.1.x86_64", "product": { "name": "ocfs2-kmp-rt-4.4.172-3.35.1.x86_64", "product_id": "ocfs2-kmp-rt-4.4.172-3.35.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-rt_debug-4.4.172-3.35.1.x86_64", "product": { "name": "ocfs2-kmp-rt_debug-4.4.172-3.35.1.x86_64", "product_id": "ocfs2-kmp-rt_debug-4.4.172-3.35.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Real Time 12 SP3", "product": { "name": "SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-rt-4.4.172-3.35.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.172-3.35.1.x86_64" }, "product_reference": "cluster-md-kmp-rt-4.4.172-3.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-rt-4.4.172-3.35.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.172-3.35.1.x86_64" }, "product_reference": "dlm-kmp-rt-4.4.172-3.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-rt-4.4.172-3.35.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.172-3.35.1.x86_64" }, "product_reference": "gfs2-kmp-rt-4.4.172-3.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-rt-4.4.172-3.35.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.172-3.35.1.noarch" }, "product_reference": "kernel-devel-rt-4.4.172-3.35.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-4.4.172-3.35.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.172-3.35.1.x86_64" }, "product_reference": "kernel-rt-4.4.172-3.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-base-4.4.172-3.35.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.172-3.35.1.x86_64" }, "product_reference": "kernel-rt-base-4.4.172-3.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-4.4.172-3.35.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.172-3.35.1.x86_64" }, "product_reference": "kernel-rt-devel-4.4.172-3.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt_debug-devel-4.4.172-3.35.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.172-3.35.1.x86_64" }, "product_reference": "kernel-rt_debug-devel-4.4.172-3.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-rt-4.4.172-3.35.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.172-3.35.1.noarch" }, "product_reference": "kernel-source-rt-4.4.172-3.35.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-rt-4.4.172-3.35.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.172-3.35.1.x86_64" }, "product_reference": "kernel-syms-rt-4.4.172-3.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-rt-4.4.172-3.35.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP3", "product_id": "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.172-3.35.1.x86_64" }, "product_reference": "ocfs2-kmp-rt-4.4.172-3.35.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18249" } ], "notes": [ { "category": "general", "text": "The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.172-3.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18249", "url": "https://www.suse.com/security/cve/CVE-2017-18249" }, { "category": "external", "summary": "SUSE Bug 1087036 for CVE-2017-18249", "url": "https://bugzilla.suse.com/1087036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.172-3.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.172-3.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-22T12:47:15Z", "details": "moderate" } ], "title": "CVE-2017-18249" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.172-3.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.172-3.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.172-3.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-22T12:47:15Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.172-3.35.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.172-3.35.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Real Time 12 SP3:cluster-md-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:dlm-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:gfs2-kmp-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-devel-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-base-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-rt_debug-devel-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:kernel-source-rt-4.4.172-3.35.1.noarch", "SUSE Linux Enterprise Real Time 12 SP3:kernel-syms-rt-4.4.172-3.35.1.x86_64", "SUSE Linux Enterprise Real Time 12 SP3:ocfs2-kmp-rt-4.4.172-3.35.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-22T12:47:15Z", "details": "moderate" } ], "title": "CVE-2019-3460" } ] }
suse-su-2019:0784-1
Vulnerability from csaf_suse
Published
2019-03-28 07:46
Modified
2019-03-28 07:46
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).
- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable (bnc#1123161).
- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).
- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).
- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).
- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host's stack memory contents to a guest (bsc#1124735).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).
- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks. (bnc#1122971).
The following non-security bugs were fixed:
- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).
- 9p: clear dangling pointers in p9stat_free (bsc#1051510).
- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).
- 9p/net: fix memory leak in p9_client_create (bsc#1051510).
- 9p/net: put a lower bound on msize (bsc#1051510).
- 9p: use inode->i_lock to protect i_size_write() under 32-bit (bsc#1051510).
- ACPI/APEI: Clear GHES block_status before panic() (bsc#1051510).
- acpi / device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).
- acpi/nfit: Block function zero DSMs (bsc#1051510).
- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).
- acpi/nfit: Fix bus command validation (bsc#1051510).
- acpi/nfit: Fix command-supported detection (bsc#1051510).
- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).
- acpi/nfit: Fix user-initiated ARS to be 'ARS-long' rather than 'ARS-short' (bsc#1124969).
- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).
- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).
- acpi / video: Extend chassis-type detection with a 'Lunch Box' check (bsc#1051510).
- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).
- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705
- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).
- add mainline tags for two hyperv iommu patches
- Adjust a commit id in a nvme patch to make our scripts happy
- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).
- ALSA: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).
- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).
- ALSA: compress: Fix stop handling on compressed capture streams (bsc#1051510).
- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).
- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).
- ALSA: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).
- ALSA: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).
- ALSA: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).
- ALSA: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).
- ALSA: hda/realtek - Fixed hp_pin no value (bsc#1051510).
- ALSA: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).
- ALSA: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).
- ALSA: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).
- ALSA: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).
- ALSA: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).
- ALSA: hda - Serialize codec registrations (bsc#1122944).
- ALSA: hda - Use standard device registration for beep (bsc#1122944).
- ALSA: oxfw: add support for APOGEE duet FireWire (bsc#1051510).
- ALSA: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).
- ALSA: usb-audio: Add support for new T+A USB DAC (bsc#1051510).
- ALSA: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).
- altera-stapl: check for a null key before strcasecmp'ing it (bsc#1051510).
- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).
- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).
- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).
- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).
- arm64: fault: avoid send SIGBUS two times (bsc#1126393).
- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).
- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).
- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).
- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).
- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).
- arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).
- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).
- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).
- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).
- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).
- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).
- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).
- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).
- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).
- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).
- arm: pxa: avoid section mismatch warning (bsc#1051510).
- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).
- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).
- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).
- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).
- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).
- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).
- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).
- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).
- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).
- assoc_array: Fix shortcut creation (bsc#1051510).
- ata: ahci: mvebu: remove stale comment (bsc#1051510).
- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).
- ath9k: dynack: check da->enabled first in sampling routines (bsc#1051510).
- ath9k: dynack: make ewma estimation faster (bsc#1051510).
- ath9k: dynack: use authentication messages for 'late' ack (bsc#1051510).
- atm: he: fix sign-extension overflow on large shift (bsc#1051510).
- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).
- ax25: fix possible use-after-free (bsc#1051510).
- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)
- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).
- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).
- batman-adv: Force mac header to start of data on xmit (bsc#1051510).
- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).
- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).
- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).
- blk-mq: fix a hung issue when fsync (bsc#1125252).
- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).
- block: break discard submissions into the user defined size (git-fixes).
- block: cleanup __blkdev_issue_discard() (git-fixes).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).
- blockdev: Fix livelocks on loop device (bsc#1124984).
- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).
- block: do not use bio->bi_vcnt to figure out segment number (bsc#1128895).
- block: do not warn when doing fsync on read-only devices (bsc#1125252).
- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).
- block: fix infinite loop if the device loses discard capability (git-fixes).
- block/loop: Use global lock for ioctl() operation (bsc#1124974).
- block: make sure discard bio is aligned with logical block size (git-fixes).
- block: make sure writesame bio is aligned with logical block size (git-fixes).
- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).
- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).
- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).
- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).
- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).
- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).
- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).
- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).
- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282).
- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).
- bonding: update nest level on unlink (git-fixes).
- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).
- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).
- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1083647).
- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).
- bpf: Fix syscall's stackmap lookup potential deadlock (bsc#1083647).
- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).
- bpf/verifier: fix verifier instability (bsc#1056787).
- bsg: allocate sense buffer if requested (bsc#1106811).
- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).
- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).
- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).
- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).
- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).
- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).
- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).
- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).
- btrfs: fix fsync after succession of renames of different files (bsc#1126481).
- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).
- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).
- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).
- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).
- btrfs: Improve btrfs_search_slot description (bsc#1126802).
- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1063638).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).
- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).
- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).
- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1063638).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).
- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).
- btrfs: remove always true check in unlock_up (bsc#1126802).
- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).
- btrfs: remove unnecessary level check in balance_level (bsc#1126802).
- btrfs: remove unused check of skip_locking (bsc#1126802).
- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).
- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).
- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).
- btrfs: split btrfs_extent_same (bsc#1127493).
- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).
- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).
- can: bcm: check timer values before ktime conversion (bsc#1051510).
- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).
- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).
- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).
- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).
- ceph: avoid repeatedly adding inode to mdsc->snap_flush_list (bsc#1126790).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).
- cfg80211: extend range deviation for DMG (bsc#1051510).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).
- checkstack.pl: fix for aarch64 (bsc#1051510).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- cifs: add missing debug entries for kconfig options (bsc#1051510).
- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510).
- cifs: add sha512 secmech (bsc#1051510).
- cifs: Add support for reading attributes on SMB2+ (bsc#1051510).
- cifs: Add support for writing attributes on SMB2+ (bsc#1051510).
- cifs: Always resolve hostname before reconnecting (bsc#1051510).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).
- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).
- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).
- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510).
- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).
- cifs: Fix NULL pointer dereference of devname (bnc#1129519).
- cifs: fix return value for cifs_listxattr (bsc#1051510).
- cifs: Fix separator when building path from dentry (bsc#1051510).
- cifs: fix set info (bsc#1051510).
- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).
- cifs: fix wrapping bugs in num_entries() (bsc#1051510).
- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: implement v3.11 preauth integrity (bsc#1051510).
- cifs: invalidate cache when we truncate a file (bsc#1051510).
- cifs: make 'nodfs' mount opt a superblock flag (bsc#1051510).
- cifs: OFD locks do not conflict with eachothers (bsc#1051510).
- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).
- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: refactor crypto shash/sdesc allocation&free (bsc#1051510).
- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).
- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).
- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).
- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).
- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).
- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).
- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).
- clk: imx6q: reset exclusive gates on init (bsc#1051510).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).
- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).
- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).
- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).
- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).
- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).
- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).
- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).
- clk: socfpga: fix refcount leak (bsc#1051510).
- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).
- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).
- clk: sunxi-ng: enable so-said LDOs for A64 SoC's pll-mipi clock (bsc#1051510).
- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).
- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).
- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).
- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).
- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).
- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).
- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).
- configfs: fix registered group removal (bsc#1051510).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).
- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).
- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).
- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).
- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).
- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).
- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).
- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).
- Cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).
- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).
- crypto: ahash - fix another early termination in hash walk (bsc#1051510).
- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).
- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).
- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).
- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).
- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).
- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).
- crypto: caam - fixed handling of sg list (bsc#1051510).
- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).
- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).
- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).
- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).
- crypto: hash - set CRYPTO_TFM_NEED_KEY if ->setkey() fails (bsc#1051510).
- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).
- crypto: tgr192 - fix unaligned memory access (bsc#1051510).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).
- cw1200: drop useless LIST_HEAD (bsc#1051510).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).
- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).
- debugfs: fix debugfs_rename parameter checking (bsc#1051510).
- Delete patches.fixes/block-loop-Use-global-lock-for-ioctl-operation.patch: It makes existing deadlocks much more probable (bsc#1129739).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).
- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).
- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).
- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).
- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).
- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).
- dmaengine: at_hdmac: fix module unloading (bsc#1051510).
- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).
- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).
- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).
- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).
- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).
- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).
- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).
- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).
- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).
- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).
- dma: Introduce dma_max_mapping_size() (bsc#1120008).
- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).
- dm: call blk_queue_split() to impose device limits on bios (git-fixes).
- dm: do not allow readahead to limit IO size (git-fixes).
- dm thin: send event about thin-pool state change _after_ making it (git-fixes).
- dm zoned: Fix target BIO completion handling (git-fixes).
- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).
- Do not log confusing message on reconnect by default (bsc#1129664).
- Do not log expected error on DFS referral request (bsc#1051510).
- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).
- driver core: Move async_synchronize_full call (bsc#1051510).
- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).
- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).
- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).
- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).
- drivers/sbus/char: add of_node_put() (bsc#1051510).
- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).
- drm/ast: Fix connector leak during driver unload (bsc#1051510).
- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).
- drm/atomic-helper: Complete fake_commit->flip_done potentially earlier (bsc#1051510).
- drm: Block fb changes for async plane updates (bsc#1051510).
- drm/bridge: tc358767: add defines for DP1_SRCCTRL & PHY_2LANE (bsc#1051510).
- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).
- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).
- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).
- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).
- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).
- drm: Clear state->acquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).
- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).
- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)
- drm/etnaviv: potential NULL dereference (bsc#1113722)
- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)
- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)
- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)
- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)
- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)
- drm/i915/gvt: Fix mmap range check (bsc#1120902)
- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)
- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).
- drm/i915/opregion: fix version check (bsc#1113722)
- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)
- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).
- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)
- drm/meson: add missing of_node_put (bsc#1051510).
- drm/modes: Prevent division by zero htotal (bsc#1051510).
- drm/msm: Fix error return checking (bsc#1051510).
- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).
- drm/msm: Unblock writer if reader closes file (bsc#1051510).
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)
- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).
- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)
- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)
- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)
- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).
- drm/rockchip: fix for mailbox read size (bsc#1051510).
- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)
- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).
- drm/vmwgfx: Do not double-free the mode stored in par->set_mode (bsc#1103429)
- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)
- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)
- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).
- earlycon: Initialize port->uartclk based on clock-frequency property (bsc#1051510).
- earlycon: Remove hardcoded port->uartclk initialization in of_setup_earlycon (bsc#1051510).
- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)
- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).
- enic: fix checksum validation for IPv6 (bsc#1051510).
- esp6: fix memleak on error path in esp6_input (bsc#1051510).
- esp: Fix locking on page fragment allocation (bsc#1051510).
- esp: Fix memleaks on error paths (bsc#1051510).
- esp: Fix skb tailroom calculation (bsc#1051510).
- exportfs: do not read dentry after free (bsc#1051510).
- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).
- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).
- ext4: Fix crash during online resizing (bsc#1122779).
- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).
- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).
- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).
- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).
- fanotify: fix handling of events on child sub-directory (bsc#1122019).
- fat: validate ->i_start before using (bsc#1051510).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1113722)
- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).
- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).
- floppy: check_events callback should not return a negative number (bsc#1051510).
- fork: do not copy inconsistent signal handler state to child (bsc#1051510).
- fork: record start_time late (git-fixes).
- fork: unconditionally clear stack on fork (git-fixes).
- fs/cifs: require sha512 (bsc#1051510).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).
- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).
- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).
- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).
- fuse: handle zero sized retrieve correctly (bsc#1051510).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bsc#1051510).
- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).
- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).
- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).
- geneve, vxlan: Do not set exceptions if skb->len < mtu (bsc#1123456).
- genwqe: Fix size check (bsc#1051510).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bsc#1120601).
- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).
- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).
- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).
- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).
- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).
- gpio: pl061: handle failed allocations (bsc#1051510).
- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).
- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)
- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).
- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).
- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).
- hfs: do not free node before using (bsc#1051510).
- hfsplus: do not free node before using (bsc#1051510).
- hfsplus: prevent btree data loss on root split (bsc#1051510).
- hfs: prevent btree data loss on root split (bsc#1051510).
- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).
- hpet: Fix missing '=' character in the __setup() code of hpet_mmap_enable (git-fixes).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).
- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).
- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).
- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).
- i2c-axxia: check for error conditions first (bsc#1051510).
- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).
- i2c: cadence: Fix the hold bit setting (bsc#1051510).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).
- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).
- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).
- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).
- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).
- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).
- IB/core: Destroy QP if XRC QP fails (bsc#1046306).
- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).
- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).
- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).
- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- ide: pmac: add of_node_put() (bsc#1051510).
- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).
- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).
- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).
- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).
- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).
- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).
- input: bma150 - register input device after setting private data (bsc#1051510).
- input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).
- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).
- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).
- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).
- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).
- input: raspberrypi-ts - fix link error (git-fixes).
- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).
- input: restore EV_ABS ABS_RESERVED (bsc#1051510).
- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).
- input: synaptics - enable SMBus for HP EliteBook 840 G4 (bsc#1051510).
- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).
- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).
- intel_th: Do not reference unassigned outputs (bsc#1051510).
- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).
- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).
- iomap: warn on zero-length mappings (bsc#1127062).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).
- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).
- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).
- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).
- ipmi:pci: Blacklist a Realtek 'IPMI' device (git-fixes).
- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).
- ipsec: check return value of skb_to_sgvec always (bsc#1051510).
- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).
- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).
- ipv6: addrlabel: per netns list (bsc#1122982).
- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).
- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).
- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).
- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982).
- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).
- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).
- ip: validate header length on virtual device xmit (networking-stable-19_01_04).
- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).
- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).
- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).
- iscsi target: fix session creation failure handling (bsc#1051510).
- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).
- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).
- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).
- iser: set sector for ambiguous mr status errors (bsc#1051510).
- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).
- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).
- iwlwifi: mvm: fix RSS config command (bsc#1051510).
- iwlwifi: pcie: fix emergency path (bsc#1051510).
- iwlwifi: pcie: fix TX while flushing (bsc#1120902).
- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).
- ixgbe: check return value of napi_complete_done() (bsc#1051510).
- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).
- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).
- kabi: fix xhci kABI stability (bsc#1119086).
- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).
- kabi: handle addition of uevent_sock into struct net (bsc#1122982).
- kabi: Preserve kABI for dma_max_mapping_size() (bsc#1120008).
- kabi: protect struct sctp_association (kabi).
- kabi: protect vhost_log_write (kabi).
- kabi: restore ip_tunnel_delete_net() (bsc#1122982).
- kabi workaroudn for ath9k ath_node.ackto type change (bsc#1051510).
- kABI workaround for bt_accept_enqueue() change (bsc#1051510).
- kabi workaround for deleted snd_hda_register_beep_device() (bsc#1122944).
- kabi workaround for snd_hda_bus.bus_probing addition (bsc#1122944).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).
- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).
- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).
- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).
- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).
- KEYS: allow reaching the keys quotas exactly (bsc#1051510).
- keys: Timestamp new keys (bsc#1051510).
- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).
- kgdboc: Fix restrict error (bsc#1051510).
- kgdboc: Fix warning with module build (bsc#1051510).
- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).
- kobject: copy env blob in one go (bsc#1122982).
- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).
- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).
- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).
- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).
- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).
- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).
- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- kvm: x86: fix L1TF's MMIO GFN calculation (bsc#1124204).
- kvm: x86: Fix single-step debugging (bsc#1129295).
- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).
- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).
- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).
- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).
- lan78xx: Resolve issue with changing MAC address (bsc#1051510).
- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).
- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).
- libceph: handle an empty authorize reply (bsc#1126789).
- lib/div64.c: off by one in shift (bsc#1051510).
- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).
- libnvdimm/label: Clear 'updating' flag after label-set update (bsc#1129543).
- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).
- lib/rbtree-test: lower default params (git-fixes).
- lightnvm: fail fast on passthrough commands (bsc#1125780).
- livepatch: Change unsigned long old_addr -> void *old_func in struct klp_func (bsc#1071995).
- livepatch: Consolidate klp_free functions (bsc#1071995 ).
- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).
- livepatch: Define a macro for new API identification (bsc#1071995).
- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).
- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).
- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).
- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).
- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).
- livepatch: Remove signal sysfs attribute (bsc#1071995 ).
- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).
- livepatch: Send a fake signal periodically (bsc#1071995 ).
- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).
- livepatch: Simplify API by removing registration step (bsc#1071995).
- llc: do not use sk_eat_skb() (bsc#1051510).
- lockd: fix access beyond unterminated strings in prints (git-fixes).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: drop caches if offset or block_size are changed (bsc#1124975).
- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).
- LSM: Check for NULL cred-security on free (bsc#1051510).
- mac80211: Add attribute aligned(2) to struct 'action' (bsc#1051510).
- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).
- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).
- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).
- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).
- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).
- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).
- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).
- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).
- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).
- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).
- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).
- media: s5k4ecgx: delete a bogus error message (bsc#1051510).
- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).
- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).
- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).
- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).
- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).
- media: uvcvideo: Fix 'type' check leading to overflow (bsc#1051510).
- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).
- media: v4l2-tpg: array index could become negative (bsc#1051510).
- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).
- media: vb2: be sure to unlock mutex on errors (bsc#1051510).
- media: vb2: vb2_mmap: move lock up (bsc#1051510).
- media: vivid: fix error handling of kthread_run (bsc#1051510).
- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).
- media: vivid: set min width/height to a value > 0 (bsc#1051510).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).
- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).
- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).
- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).
- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).
- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).
- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).
- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).
- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).
- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).
- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).
- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).
- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).
- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).
- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).
- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).
- misc: sram: enable clock before registering regions (bsc#1051510).
- misc: sram: fix resource leaks in probe error path (bsc#1051510).
- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).
- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).
- mISDN: fix a race in dev_expire_timer() (bsc#1051510).
- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).
- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).
- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).
- mmap: relax file size limit for regular files (git fixes (mm/mmap)).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).
- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).
- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).
- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).
- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).
- mmc: omap: fix the maximum timeout setting (bsc#1051510).
- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).
- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).
- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).
- mmc: spi: Fix card detection during probe (bsc#1051510).
- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).
- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).
- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).
- mm/ksm.c: ignore STABLE_FLAG of rmap_item->address in rmap_walk_ksm() (git fixes (mm/ksm)).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).
- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).
- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)
- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).
- mm: migration: factor out code to compute expected number of page references (bsc#1084216).
- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).
- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).
- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).
- Move the upstreamed HD-audio fix into sorted section
- mpt3sas: check sense buffer before copying sense data (bsc#1106811).
- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).
- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).
- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).
- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).
- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).
- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).
- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).
- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).
- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).
- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).
- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).
- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).
- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).
- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).
- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).
- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).
- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).
- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).
- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).
- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).
- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).
- mtd: nand: ifc: update bufnum mask for ver >= 2.0.0 (bsc#1051510).
- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).
- mtd: nand: omap2: Fix subpage write (bsc#1051510).
- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).
- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).
- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).
- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).
- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).
- mtd: nand: vf610: set correct ooblayout (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).
- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).
- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).
- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).
- mv88e6060: disable hardware level MAC learning (bsc#1051510).
- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).
- neighbour: Avoid writing before skb->head in neigh_hh_output() (networking-stable-18_12_12).
- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).
- net: add uevent socket member (bsc#1122982).
- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).
- net: aquantia: fixed instack structure overflow (git-fixes).
- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).
- net: bcmgenet: abort suspend on error (bsc#1051510).
- net: bcmgenet: code movement (bsc#1051510).
- net: bcmgenet: fix OF child-node lookup (bsc#1051510).
- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).
- net: bcmgenet: return correct value 'ret' from bcmgenet_power_down (bsc#1051510).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).
- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).
- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- net: do not call update_pmtu unconditionally (bsc#1123456).
- net: Do not default Cavium PTP driver to 'y' (bsc#1110096).
- net: dp83640: expire old TX-skb (networking-stable-19_02_10).
- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).
- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).
- net: ena: fix race between link up and device initalization (bsc#1083548).
- netfilter: nf_tables: check the result of dereferencing base_chain->stats (git-fixes).
- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).
- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).
- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).
- net: hns3: add handling for big TX fragment (bsc#1104353 ).
- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).
- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).
- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).
- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).
- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).
- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).
- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).
- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).
- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).
- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).
- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).
- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).
- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).
- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).
- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).
- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).
- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Release resource on error flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).
- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).
- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).
- netns: restrict uevents (bsc#1122982).
- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).
- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).
- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).
- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).
- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).
- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).
- netrom: switch to sock timer API (bsc#1051510).
- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).
- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).
- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).
- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).
- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).
- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).
- net: stmmac: Fix PCI module removal leak (git-fixes).
- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).
- net: stmmac: Use mutex instead of spinlock (git-fixes).
- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).
- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).
- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).
- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).
- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).
- nfit: acpi_nfit_ctl(): Check out_obj->type in the right place (bsc#1129547).
- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).
- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).
- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).
- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).
- nfsd: Fix an Oops in free_session() (git-fixes).
- nfs: Fix a missed page unlock after pg_doio() (git-fixes).
- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).
- nfsv4.1: Fix the r/wsize checking (git-fixes).
- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).
- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).
- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).
- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).
- nvme: kABI fix for scan_lock (bsc#1123882).
- nvme: lock NS list changes while handling command effects (bsc#1123882).
- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).
- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).
- nvme-multipath: round-robin I/O policy (bsc#1110705).
- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).
- of, numa: Validate some distance map rules (bsc#1051510).
- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).
- omap2fb: Fix stack memory disclosure (bsc#1120902)
- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).
- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).
- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).
- packet: Do not leak dev refcounts on error exit (git-fixes).
- packet: validate address length if non-zero (networking-stable-19_01_04).
- packet: validate address length (networking-stable-19_01_04).
- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).
- Partially revert 'block: fail op_is_write() requests to (bsc#1125252).
- pci: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).
- pci: Disable broken RTIT_BAR of Intel TH (bsc#1120318).
- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).
- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).
- pcrypt: use format specifier in kobject_add (bsc#1051510).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).
- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).
- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).
- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).
- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).
- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).
- phy: tegra: remove redundant self assignment of 'map' (bsc#1051510).
- phy: work around 'phys' references to usb-nop-xceiv devices (bsc#1051510).
- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).
- pinctrl: meson: fix pull enable register calculation (bsc#1051510).
- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).
- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).
- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).
- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).
- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).
- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).
- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).
- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).
- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).
- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).
- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).
- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).
- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).
- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).
- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).
- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).
- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).
- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).
- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).
- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).
- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).
- powerpc/tm: Fix comment (bsc#1118338).
- powerpc/tm: Fix endianness flip on trap (bsc#1118338).
- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).
- powerpc/tm: Fix HTM documentation (bsc#1118338).
- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).
- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).
- powerpc/tm: Print 64-bits MSR (bsc#1118338).
- powerpc/tm: Print scratch value (bsc#1118338).
- powerpc/tm: Reformat comments (bsc#1118338).
- powerpc/tm: Remove msr_tm_active() (bsc#1118338).
- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).
- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).
- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).
- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).
- powerpc/tm: Update function prototype comment (bsc#1118338).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).
- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).
- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).
- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).
- ptp_kvm: probe for kvm guest availability (bsc#1098382).
- ptr_ring: wrap back ->producer in __ptr_ring_swap_queue() (networking-stable-19_01_04).
- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).
- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).
- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).
- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).
- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).
- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).
- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).
- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).
- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).
- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).
- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).
- RDMA/core: Fix unwinding flow in case of error to register device (bsc#1046306).
- RDMA/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).
- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)
- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).
- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).
- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).
- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).
- Remove blacklist of virtio patch so we can install it (bsc#1114585)
- Revert 'drm/rockchip: Allow driver to be shutdown on reboot/kexec' (bsc#1051510).
- Revert 'Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G' (bsc#1051510).
- Revert 'openvswitch: Fix template leak in error cases.' (bsc#1051510).
- Revert 'scsi: qla2xxx: Fix NVMe Target discovery' (bsc#1125252).
- Revert 'sd: disable logical block provisioning if 'lbpme' is not set' This reverts commit e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not accepted upstream.
- Revert 'serial: 8250: Fix clearing FIFOs in RS485 mode again' (bsc#1051510).
- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.
- Revert 'xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue' (bsc#1120854).
- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).
- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697) dracut has been using permissions 0600 for the initrd for a long time.
- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)
- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).
- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).
- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).
- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).
- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).
- s390/early: improve machine detection (git-fixes).
- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).
- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).
- s390/qeth: fix use-after-free in error path (bsc#1127534).
- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).
- s390/sthyi: Fix machine name validity indication (git-fixes).
- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).
- sata_rcar: fix deferred probing (bsc#1051510).
- sbus: char: add of_node_put() (bsc#1051510).
- sc16is7xx: Fix for multi-channel stall (bsc#1051510).
- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).
- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- sch_multiq: fix double free on init failure (bsc#1051510).
- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes
- scripts/git_sort/git_sort.py: Add s390/linux.git fixes.
- scripts/git_sort/git_sort.py: add vfs 'fixes' branch
- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).
- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).
- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).
- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).
- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).
- scsi: lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).
- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).
- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).
- scsi: lpfc: fix remoteport access (bsc#1125252).
- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).
- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).
- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).
- scsi: mpt3sas: Add ioc_<level> logging macros (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_<level> with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_<level> with MPT3SAS_FMT to ioc_<level> (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).
- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).
- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).
- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).
- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).
- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).
- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).
- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).
- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).
- scsi: qla2xxx: Simplify conditional check (bsc#1094555).
- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).
- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).
- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).
- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).
- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).
- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).
- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).
- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).
- sctp: kfree_rcu asoc (networking-stable-18_12_12).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).
- selftests/livepatch: introduce tests (bsc#1071995).
- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).
- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).
- selinux: always allow mounting submounts (bsc#1051510).
- selinux: fix GPF on invalid policy (bsc#1051510).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).
- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).
- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).
- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).
- serial: imx: fix error handling in console_setup (bsc#1051510).
- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).
- serial/sunsu: fix refcount leak (bsc#1051510).
- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).
- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).
- signal: Always deliver the kernel's SIGKILL and SIGSTOP to a pid namespace init (git-fixes).
- skge: potential memory corruption in skge_get_regs() (bsc#1051510).
- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).
- sky2: Increase D3 delay again (bsc#1051510).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).
- smb3.1.1 dialect is no longer experimental (bsc#1051510).
- smb311: Fix reconnect (bsc#1051510).
- smb311: Improve checking of negotiate security contexts (bsc#1051510).
- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).
- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).
- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).
- smb3: check for and properly advertise directory lease support (bsc#1051510).
- smb3: directory sync should not return an error (bsc#1051510).
- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).
- smb3: do not request leases in symlink creation and query (bsc#1051510).
- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510).
- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).
- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).
- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).
- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).
- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).
- smb3: fix various xid leaks (bsc#1051510).
- smb3: Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510).
- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).
- smb3: Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510).
- smb3: remove noisy warning message on mount (bsc#1129664).
- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).
- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).
- soc/tegra: Do not leak device tree node reference (bsc#1051510).
- splice: do not merge into linked buffers (git-fixes).
- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).
- staging: iio: ad7780: update voltage on read (bsc#1051510).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).
- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).
- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).
- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).
- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).
- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).
- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).
- staging: speakup: Replace strncpy with memcpy (bsc#1051510).
- staging: wilc1000: fix to set correct value for 'vif_num' (bsc#1051510).
- sunrpc: correct the computation for page_ptr when truncating (git-fixes).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- sunrpc: Fix leak of krb5p encode pages (git-fixes).
- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).
- sunrpc: safely reallow resvport min/max inversion (git-fixes).
- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).
- swiotlb: Add is_swiotlb_active() function (bsc#1120008).
- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).
- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).
- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).
- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).
- tcp: batch tcp_net_metrics_exit (bsc#1122982).
- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).
- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).
- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).
- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).
- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).
- tcp: lack of available data can also cause TSO defer (git-fixes).
- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).
- team: Free BPF filter when unregistering netdev (bsc#1051510).
- thermal: do not clear passive state during system sleep (bsc#1051510).
- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).
- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).
- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).
- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).
- thermal: mediatek: fix register index error (bsc#1051510).
- timekeeping: Use proper seqcount initializer (bsc#1051510).
- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).
- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).
- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).
- tipc: fix a double kfree_skb() (networking-stable-19_01_04).
- tipc: fix a race condition of releasing subscriber object (bsc#1051510).
- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).
- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).
- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).
- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).
- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).
- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).
- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).
- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).
- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).
- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).
- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).
- tracing: Do not free iter->trace in fail path of tracing_open_pipe() (bsc#1129581).
- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).
- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).
- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).
- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).
- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).
- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).
- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).
- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).
- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).
- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).
- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).
- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).
- uevent: add alloc_uevent_skb() helper (bsc#1122982).
- Update config files. Remove conditional support for SMB2 and SMB3:
- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).
- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).
- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.
- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).
- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).
- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).
- usb: Add new USB LPM helpers (bsc#1120902).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).
- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).
- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).
- usb: dwc3: gadget: Clear req->needs_extra_trb flag on cleanup (bsc#1120902).
- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).
- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).
- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).
- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).
- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).
- usb: musb: dsps: fix otg state machine (bsc#1051510).
- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).
- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).
- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).
- usb: phy: am335x: fix race condition in _probe (bsc#1051510).
- usb: serial: option: add Fibocom NL678 series (bsc#1120902).
- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).
- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).
- usb: storage: add quirk for SMI SM3350 (bsc#1120902).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).
- usb: xhci: fix 'broken_suspend' placement in struct xchi_hcd (bsc#1119086).
- veth: set peer GSO values (bsc#1051510).
- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).
- vfio: ccw: process ssch with interrupts disabled (git-fixes).
- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).
- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).
- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).
- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).
- vhost: log dirty page correctly (networking-stable-19_01_26).
- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).
- vhost/vsock: fix uninitialized vhost_vsock->guest_cid (bsc#1051510).
- video: clps711x-fb: release disp device node in probe() (bsc#1051510).
- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).
- virtio: Introduce virtio_max_dma_size() (bsc#1120008).
- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).
- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).
- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).
- virtio/s390: avoid race on vcdev->config (git-fixes).
- virtio/s390: fix race in ccw_io_helper() (git-fixes).
- vmci: Support upto 64-bit PPNs (bsc#1127286).
- vscok: Send reset control packet when socket is partially bound (networking-stable-19_01_04).
- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).
- vt: invoke notifier on screen size change (bsc#1051510).
- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).
- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).
- vxlan: test dev->flags & IFF_UP before calling gro_cells_receive() (git-fixes).
- vxlan: update skb dst pmtu on tx path (bsc#1123456).
- w90p910_ether: remove incorrect __init annotation (bsc#1051510).
- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).
- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).
- writeback: do not decrement wb->refcnt if !wb->bdi (git fixes (writeback)).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86/a.out: Clear the dump structure initially (bsc#1114279).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).
- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).
- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).
- x86/bugs: Add AMD's variant of SSB_NO (bsc#1114279).
- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).
- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).
- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).
- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).
- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).
- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).
- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).
- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).
- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).
- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).
- x86/vdso: Remove obsolete 'fake section table' reservation (bsc#1114279).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).
- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).
- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: fix dom0 boot on huge systems (bsc#1127836).
- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).
- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).
- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).
- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).
- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).
- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).
- yama: Check for pid death before checking ancestry (bsc#1051510).
- yama: fix a missing-check bug (bsc#1051510).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).
- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).
Patchnames
SUSE-2019-784,SUSE-SLE-Module-Basesystem-15-2019-784,SUSE-SLE-Module-Development-Tools-15-2019-784,SUSE-SLE-Module-Development-Tools-OBS-15-2019-784,SUSE-SLE-Module-Legacy-15-2019-784,SUSE-SLE-Module-Live-Patching-15-2019-784,SUSE-SLE-Product-HA-15-2019-784,SUSE-SLE-Product-WE-15-2019-784
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).\n- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable (bnc#1123161).\n- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).\n- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).\n- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).\n- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host\u0027s stack memory contents to a guest (bsc#1124735).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).\n- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks. (bnc#1122971).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).\n- 9p: clear dangling pointers in p9stat_free (bsc#1051510).\n- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).\n- 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n- 9p/net: put a lower bound on msize (bsc#1051510).\n- 9p: use inode-\u003ei_lock to protect i_size_write() under 32-bit (bsc#1051510).\n- ACPI/APEI: Clear GHES block_status before panic() (bsc#1051510).\n- acpi / device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).\n- acpi/nfit: Block function zero DSMs (bsc#1051510).\n- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).\n- acpi/nfit: Fix bus command validation (bsc#1051510).\n- acpi/nfit: Fix command-supported detection (bsc#1051510).\n- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).\n- acpi/nfit: Fix user-initiated ARS to be \u0027ARS-long\u0027 rather than \u0027ARS-short\u0027 (bsc#1124969).\n- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).\n- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).\n- acpi / video: Extend chassis-type detection with a \u0027Lunch Box\u0027 check (bsc#1051510).\n- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705\n- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).\n- add mainline tags for two hyperv iommu patches\n- Adjust a commit id in a nvme patch to make our scripts happy\n- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).\n- ALSA: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).\n- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n- ALSA: compress: Fix stop handling on compressed capture streams (bsc#1051510).\n- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).\n- ALSA: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).\n- ALSA: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).\n- ALSA: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).\n- ALSA: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).\n- ALSA: hda/realtek - Fixed hp_pin no value (bsc#1051510).\n- ALSA: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).\n- ALSA: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).\n- ALSA: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).\n- ALSA: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).\n- ALSA: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).\n- ALSA: hda - Serialize codec registrations (bsc#1122944).\n- ALSA: hda - Use standard device registration for beep (bsc#1122944).\n- ALSA: oxfw: add support for APOGEE duet FireWire (bsc#1051510).\n- ALSA: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).\n- ALSA: usb-audio: Add support for new T+A USB DAC (bsc#1051510).\n- ALSA: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).\n- altera-stapl: check for a null key before strcasecmp\u0027ing it (bsc#1051510).\n- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).\n- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).\n- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).\n- arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).\n- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).\n- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).\n- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).\n- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n- arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).\n- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).\n- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).\n- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).\n- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).\n- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).\n- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).\n- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).\n- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).\n- arm: pxa: avoid section mismatch warning (bsc#1051510).\n- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).\n- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).\n- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).\n- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).\n- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).\n- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).\n- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).\n- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).\n- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).\n- assoc_array: Fix shortcut creation (bsc#1051510).\n- ata: ahci: mvebu: remove stale comment (bsc#1051510).\n- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).\n- ath9k: dynack: check da-\u003eenabled first in sampling routines (bsc#1051510).\n- ath9k: dynack: make ewma estimation faster (bsc#1051510).\n- ath9k: dynack: use authentication messages for \u0027late\u0027 ack (bsc#1051510).\n- atm: he: fix sign-extension overflow on large shift (bsc#1051510).\n- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).\n- ax25: fix possible use-after-free (bsc#1051510).\n- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)\n- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).\n- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).\n- batman-adv: Force mac header to start of data on xmit (bsc#1051510).\n- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).\n- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).\n- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).\n- blk-mq: fix a hung issue when fsync (bsc#1125252).\n- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).\n- block: break discard submissions into the user defined size (git-fixes).\n- block: cleanup __blkdev_issue_discard() (git-fixes).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- blockdev: Fix livelocks on loop device (bsc#1124984).\n- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128895).\n- block: do not warn when doing fsync on read-only devices (bsc#1125252).\n- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).\n- block: fix infinite loop if the device loses discard capability (git-fixes).\n- block/loop: Use global lock for ioctl() operation (bsc#1124974).\n- block: make sure discard bio is aligned with logical block size (git-fixes).\n- block: make sure writesame bio is aligned with logical block size (git-fixes).\n- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).\n- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).\n- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).\n- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).\n- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).\n- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).\n- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).\n- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).\n- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282).\n- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).\n- bonding: update nest level on unlink (git-fixes).\n- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).\n- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).\n- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1083647).\n- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).\n- bpf: Fix syscall\u0027s stackmap lookup potential deadlock (bsc#1083647).\n- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).\n- bpf/verifier: fix verifier instability (bsc#1056787).\n- bsg: allocate sense buffer if requested (bsc#1106811).\n- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).\n- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).\n- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).\n- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).\n- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).\n- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).\n- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).\n- btrfs: fix fsync after succession of renames of different files (bsc#1126481).\n- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).\n- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).\n- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).\n- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).\n- btrfs: Improve btrfs_search_slot description (bsc#1126802).\n- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1063638).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).\n- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).\n- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).\n- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1063638).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).\n- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).\n- btrfs: remove always true check in unlock_up (bsc#1126802).\n- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).\n- btrfs: remove unnecessary level check in balance_level (bsc#1126802).\n- btrfs: remove unused check of skip_locking (bsc#1126802).\n- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).\n- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).\n- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n- btrfs: split btrfs_extent_same (bsc#1127493).\n- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).\n- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).\n- can: bcm: check timer values before ktime conversion (bsc#1051510).\n- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).\n- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).\n- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).\n- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126790).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).\n- cfg80211: extend range deviation for DMG (bsc#1051510).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).\n- checkstack.pl: fix for aarch64 (bsc#1051510).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: add missing debug entries for kconfig options (bsc#1051510).\n- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510).\n- cifs: add sha512 secmech (bsc#1051510).\n- cifs: Add support for reading attributes on SMB2+ (bsc#1051510).\n- cifs: Add support for writing attributes on SMB2+ (bsc#1051510).\n- cifs: Always resolve hostname before reconnecting (bsc#1051510).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).\n- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).\n- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).\n- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510).\n- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).\n- cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n- cifs: fix return value for cifs_listxattr (bsc#1051510).\n- cifs: Fix separator when building path from dentry (bsc#1051510).\n- cifs: fix set info (bsc#1051510).\n- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).\n- cifs: fix wrapping bugs in num_entries() (bsc#1051510).\n- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: implement v3.11 preauth integrity (bsc#1051510).\n- cifs: invalidate cache when we truncate a file (bsc#1051510).\n- cifs: make \u0027nodfs\u0027 mount opt a superblock flag (bsc#1051510).\n- cifs: OFD locks do not conflict with eachothers (bsc#1051510).\n- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).\n- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: refactor crypto shash/sdesc allocation\u0026free (bsc#1051510).\n- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).\n- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).\n- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).\n- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).\n- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).\n- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).\n- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).\n- clk: imx6q: reset exclusive gates on init (bsc#1051510).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).\n- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).\n- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).\n- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).\n- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).\n- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).\n- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).\n- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).\n- clk: socfpga: fix refcount leak (bsc#1051510).\n- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).\n- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).\n- clk: sunxi-ng: enable so-said LDOs for A64 SoC\u0027s pll-mipi clock (bsc#1051510).\n- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).\n- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).\n- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).\n- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).\n- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).\n- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).\n- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).\n- configfs: fix registered group removal (bsc#1051510).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).\n- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).\n- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).\n- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).\n- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).\n- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).\n- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n- Cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).\n- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).\n- crypto: ahash - fix another early termination in hash walk (bsc#1051510).\n- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).\n- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).\n- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).\n- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).\n- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).\n- crypto: caam - fixed handling of sg list (bsc#1051510).\n- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).\n- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).\n- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).\n- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).\n- crypto: hash - set CRYPTO_TFM_NEED_KEY if -\u003esetkey() fails (bsc#1051510).\n- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).\n- crypto: tgr192 - fix unaligned memory access (bsc#1051510).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).\n- cw1200: drop useless LIST_HEAD (bsc#1051510).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).\n- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).\n- debugfs: fix debugfs_rename parameter checking (bsc#1051510).\n- Delete patches.fixes/block-loop-Use-global-lock-for-ioctl-operation.patch: It makes existing deadlocks much more probable (bsc#1129739).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).\n- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).\n- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).\n- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).\n- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).\n- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).\n- dmaengine: at_hdmac: fix module unloading (bsc#1051510).\n- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).\n- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).\n- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).\n- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).\n- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).\n- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).\n- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).\n- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).\n- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).\n- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).\n- dma: Introduce dma_max_mapping_size() (bsc#1120008).\n- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).\n- dm: call blk_queue_split() to impose device limits on bios (git-fixes).\n- dm: do not allow readahead to limit IO size (git-fixes).\n- dm thin: send event about thin-pool state change _after_ making it (git-fixes).\n- dm zoned: Fix target BIO completion handling (git-fixes).\n- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).\n- Do not log confusing message on reconnect by default (bsc#1129664).\n- Do not log expected error on DFS referral request (bsc#1051510).\n- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).\n- driver core: Move async_synchronize_full call (bsc#1051510).\n- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).\n- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).\n- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).\n- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- drivers/sbus/char: add of_node_put() (bsc#1051510).\n- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).\n- drm/ast: Fix connector leak during driver unload (bsc#1051510).\n- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).\n- drm/atomic-helper: Complete fake_commit-\u003eflip_done potentially earlier (bsc#1051510).\n- drm: Block fb changes for async plane updates (bsc#1051510).\n- drm/bridge: tc358767: add defines for DP1_SRCCTRL \u0026 PHY_2LANE (bsc#1051510).\n- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).\n- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).\n- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).\n- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).\n- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n- drm: Clear state-\u003eacquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).\n- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).\n- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)\n- drm/etnaviv: potential NULL dereference (bsc#1113722)\n- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)\n- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)\n- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)\n- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n- drm/i915/gvt: Fix mmap range check (bsc#1120902)\n- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)\n- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).\n- drm/i915/opregion: fix version check (bsc#1113722)\n- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)\n- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)\n- drm/meson: add missing of_node_put (bsc#1051510).\n- drm/modes: Prevent division by zero htotal (bsc#1051510).\n- drm/msm: Fix error return checking (bsc#1051510).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).\n- drm/msm: Unblock writer if reader closes file (bsc#1051510).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)\n- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).\n- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)\n- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)\n- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).\n- drm/rockchip: fix for mailbox read size (bsc#1051510).\n- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)\n- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)\n- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)\n- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).\n- earlycon: Initialize port-\u003euartclk based on clock-frequency property (bsc#1051510).\n- earlycon: Remove hardcoded port-\u003euartclk initialization in of_setup_earlycon (bsc#1051510).\n- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).\n- enic: fix checksum validation for IPv6 (bsc#1051510).\n- esp6: fix memleak on error path in esp6_input (bsc#1051510).\n- esp: Fix locking on page fragment allocation (bsc#1051510).\n- esp: Fix memleaks on error paths (bsc#1051510).\n- esp: Fix skb tailroom calculation (bsc#1051510).\n- exportfs: do not read dentry after free (bsc#1051510).\n- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).\n- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).\n- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).\n- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).\n- fanotify: fix handling of events on child sub-directory (bsc#1122019).\n- fat: validate -\u003ei_start before using (bsc#1051510).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1113722)\n- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).\n- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).\n- floppy: check_events callback should not return a negative number (bsc#1051510).\n- fork: do not copy inconsistent signal handler state to child (bsc#1051510).\n- fork: record start_time late (git-fixes).\n- fork: unconditionally clear stack on fork (git-fixes).\n- fs/cifs: require sha512 (bsc#1051510).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).\n- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).\n- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).\n- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).\n- fuse: handle zero sized retrieve correctly (bsc#1051510).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bsc#1051510).\n- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).\n- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).\n- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).\n- geneve, vxlan: Do not set exceptions if skb-\u003elen \u0026lt; mtu (bsc#1123456).\n- genwqe: Fix size check (bsc#1051510).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bsc#1120601).\n- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).\n- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).\n- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).\n- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).\n- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).\n- gpio: pl061: handle failed allocations (bsc#1051510).\n- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).\n- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)\n- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).\n- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).\n- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).\n- hfs: do not free node before using (bsc#1051510).\n- hfsplus: do not free node before using (bsc#1051510).\n- hfsplus: prevent btree data loss on root split (bsc#1051510).\n- hfs: prevent btree data loss on root split (bsc#1051510).\n- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).\n- hpet: Fix missing \u0027=\u0027 character in the __setup() code of hpet_mmap_enable (git-fixes).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).\n- hv: v4.12 API for hyperv-iommu (bsc#1122822).\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).\n- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).\n- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).\n- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).\n- i2c-axxia: check for error conditions first (bsc#1051510).\n- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).\n- i2c: cadence: Fix the hold bit setting (bsc#1051510).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).\n- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).\n- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).\n- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).\n- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).\n- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).\n- IB/core: Destroy QP if XRC QP fails (bsc#1046306).\n- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).\n- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).\n- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).\n- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- ide: pmac: add of_node_put() (bsc#1051510).\n- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).\n- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).\n- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).\n- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).\n- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).\n- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).\n- input: bma150 - register input device after setting private data (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).\n- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).\n- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).\n- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).\n- input: raspberrypi-ts - fix link error (git-fixes).\n- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).\n- input: restore EV_ABS ABS_RESERVED (bsc#1051510).\n- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).\n- input: synaptics - enable SMBus for HP EliteBook 840 G4 (bsc#1051510).\n- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).\n- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).\n- intel_th: Do not reference unassigned outputs (bsc#1051510).\n- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).\n- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).\n- iomap: warn on zero-length mappings (bsc#1127062).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).\n- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).\n- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).\n- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).\n- ipmi:pci: Blacklist a Realtek \u0027IPMI\u0027 device (git-fixes).\n- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).\n- ipsec: check return value of skb_to_sgvec always (bsc#1051510).\n- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).\n- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: addrlabel: per netns list (bsc#1122982).\n- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).\n- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).\n- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).\n- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).\n- ip: validate header length on virtual device xmit (networking-stable-19_01_04).\n- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).\n- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).\n- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).\n- iscsi target: fix session creation failure handling (bsc#1051510).\n- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).\n- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).\n- iser: set sector for ambiguous mr status errors (bsc#1051510).\n- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).\n- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).\n- iwlwifi: mvm: fix RSS config command (bsc#1051510).\n- iwlwifi: pcie: fix emergency path (bsc#1051510).\n- iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).\n- ixgbe: check return value of napi_complete_done() (bsc#1051510).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).\n- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).\n- kabi: fix xhci kABI stability (bsc#1119086).\n- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).\n- kabi: handle addition of uevent_sock into struct net (bsc#1122982).\n- kabi: Preserve kABI for dma_max_mapping_size() (bsc#1120008).\n- kabi: protect struct sctp_association (kabi).\n- kabi: protect vhost_log_write (kabi).\n- kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n- kabi workaroudn for ath9k ath_node.ackto type change (bsc#1051510).\n- kABI workaround for bt_accept_enqueue() change (bsc#1051510).\n- kabi workaround for deleted snd_hda_register_beep_device() (bsc#1122944).\n- kabi workaround for snd_hda_bus.bus_probing addition (bsc#1122944).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).\n- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).\n- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).\n- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).\n- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).\n- KEYS: allow reaching the keys quotas exactly (bsc#1051510).\n- keys: Timestamp new keys (bsc#1051510).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).\n- kgdboc: Fix restrict error (bsc#1051510).\n- kgdboc: Fix warning with module build (bsc#1051510).\n- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).\n- kobject: copy env blob in one go (bsc#1122982).\n- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).\n- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).\n- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).\n- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).\n- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: fix L1TF\u0027s MMIO GFN calculation (bsc#1124204).\n- kvm: x86: Fix single-step debugging (bsc#1129295).\n- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).\n- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).\n- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).\n- lan78xx: Resolve issue with changing MAC address (bsc#1051510).\n- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).\n- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).\n- libceph: handle an empty authorize reply (bsc#1126789).\n- lib/div64.c: off by one in shift (bsc#1051510).\n- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).\n- libnvdimm/label: Clear \u0027updating\u0027 flag after label-set update (bsc#1129543).\n- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).\n- lib/rbtree-test: lower default params (git-fixes).\n- lightnvm: fail fast on passthrough commands (bsc#1125780).\n- livepatch: Change unsigned long old_addr -\u003e void *old_func in struct klp_func (bsc#1071995).\n- livepatch: Consolidate klp_free functions (bsc#1071995 ).\n- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).\n- livepatch: Define a macro for new API identification (bsc#1071995).\n- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).\n- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).\n- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).\n- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).\n- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).\n- livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).\n- livepatch: Send a fake signal periodically (bsc#1071995 ).\n- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).\n- livepatch: Simplify API by removing registration step (bsc#1071995).\n- llc: do not use sk_eat_skb() (bsc#1051510).\n- lockd: fix access beyond unterminated strings in prints (git-fixes).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: drop caches if offset or block_size are changed (bsc#1124975).\n- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).\n- LSM: Check for NULL cred-security on free (bsc#1051510).\n- mac80211: Add attribute aligned(2) to struct \u0027action\u0027 (bsc#1051510).\n- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).\n- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).\n- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).\n- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).\n- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).\n- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).\n- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).\n- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).\n- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).\n- media: s5k4ecgx: delete a bogus error message (bsc#1051510).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).\n- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).\n- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).\n- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).\n- media: uvcvideo: Fix \u0027type\u0027 check leading to overflow (bsc#1051510).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).\n- media: v4l2-tpg: array index could become negative (bsc#1051510).\n- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).\n- media: vb2: be sure to unlock mutex on errors (bsc#1051510).\n- media: vb2: vb2_mmap: move lock up (bsc#1051510).\n- media: vivid: fix error handling of kthread_run (bsc#1051510).\n- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).\n- media: vivid: set min width/height to a value \u003e 0 (bsc#1051510).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).\n- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).\n- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).\n- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).\n- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).\n- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).\n- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).\n- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).\n- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).\n- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).\n- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).\n- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).\n- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).\n- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).\n- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).\n- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).\n- misc: sram: enable clock before registering regions (bsc#1051510).\n- misc: sram: fix resource leaks in probe error path (bsc#1051510).\n- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).\n- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).\n- mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).\n- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).\n- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).\n- mmap: relax file size limit for regular files (git fixes (mm/mmap)).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).\n- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).\n- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).\n- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).\n- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).\n- mmc: omap: fix the maximum timeout setting (bsc#1051510).\n- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).\n- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n- mmc: spi: Fix card detection during probe (bsc#1051510).\n- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).\n- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).\n- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).\n- mm/ksm.c: ignore STABLE_FLAG of rmap_item-\u003eaddress in rmap_walk_ksm() (git fixes (mm/ksm)).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).\n- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).\n- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)\n- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).\n- mm: migration: factor out code to compute expected number of page references (bsc#1084216).\n- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).\n- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).\n- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).\n- Move the upstreamed HD-audio fix into sorted section\n- mpt3sas: check sense buffer before copying sense data (bsc#1106811).\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).\n- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).\n- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).\n- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).\n- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).\n- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).\n- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).\n- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).\n- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).\n- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).\n- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).\n- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).\n- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).\n- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).\n- mtd: nand: ifc: update bufnum mask for ver \u003e= 2.0.0 (bsc#1051510).\n- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).\n- mtd: nand: omap2: Fix subpage write (bsc#1051510).\n- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).\n- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).\n- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).\n- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).\n- mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).\n- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).\n- mv88e6060: disable hardware level MAC learning (bsc#1051510).\n- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).\n- neighbour: Avoid writing before skb-\u003ehead in neigh_hh_output() (networking-stable-18_12_12).\n- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).\n- net: add uevent socket member (bsc#1122982).\n- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).\n- net: aquantia: fixed instack structure overflow (git-fixes).\n- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).\n- net: bcmgenet: abort suspend on error (bsc#1051510).\n- net: bcmgenet: code movement (bsc#1051510).\n- net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n- net: bcmgenet: return correct value \u0027ret\u0027 from bcmgenet_power_down (bsc#1051510).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).\n- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- net: do not call update_pmtu unconditionally (bsc#1123456).\n- net: Do not default Cavium PTP driver to \u0027y\u0027 (bsc#1110096).\n- net: dp83640: expire old TX-skb (networking-stable-19_02_10).\n- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).\n- net: ena: fix race between link up and device initalization (bsc#1083548).\n- netfilter: nf_tables: check the result of dereferencing base_chain-\u003estats (git-fixes).\n- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).\n- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).\n- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).\n- net: hns3: add handling for big TX fragment (bsc#1104353 ).\n- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).\n- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).\n- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).\n- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).\n- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).\n- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).\n- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).\n- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).\n- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).\n- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).\n- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).\n- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).\n- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).\n- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).\n- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).\n- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).\n- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Release resource on error flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).\n- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).\n- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).\n- netns: restrict uevents (bsc#1122982).\n- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).\n- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).\n- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).\n- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).\n- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).\n- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).\n- netrom: switch to sock timer API (bsc#1051510).\n- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).\n- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).\n- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).\n- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).\n- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).\n- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).\n- net: stmmac: Fix PCI module removal leak (git-fixes).\n- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).\n- net: stmmac: Use mutex instead of spinlock (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).\n- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).\n- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).\n- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).\n- nfit: acpi_nfit_ctl(): Check out_obj-\u003etype in the right place (bsc#1129547).\n- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).\n- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).\n- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).\n- nfsd: Fix an Oops in free_session() (git-fixes).\n- nfs: Fix a missed page unlock after pg_doio() (git-fixes).\n- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).\n- nfsv4.1: Fix the r/wsize checking (git-fixes).\n- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).\n- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).\n- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).\n- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).\n- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).\n- nvme: kABI fix for scan_lock (bsc#1123882).\n- nvme: lock NS list changes while handling command effects (bsc#1123882).\n- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).\n- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).\n- nvme-multipath: round-robin I/O policy (bsc#1110705).\n- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).\n- of, numa: Validate some distance map rules (bsc#1051510).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).\n- omap2fb: Fix stack memory disclosure (bsc#1120902)\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).\n- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).\n- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).\n- packet: Do not leak dev refcounts on error exit (git-fixes).\n- packet: validate address length if non-zero (networking-stable-19_01_04).\n- packet: validate address length (networking-stable-19_01_04).\n- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).\n- Partially revert \u0027block: fail op_is_write() requests to (bsc#1125252).\n- pci: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).\n- pci: Disable broken RTIT_BAR of Intel TH (bsc#1120318).\n- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).\n- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).\n- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).\n- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).\n- pcrypt: use format specifier in kobject_add (bsc#1051510).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).\n- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).\n- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).\n- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).\n- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).\n- phy: tegra: remove redundant self assignment of \u0027map\u0027 (bsc#1051510).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bsc#1051510).\n- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).\n- pinctrl: meson: fix pull enable register calculation (bsc#1051510).\n- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).\n- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).\n- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).\n- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).\n- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).\n- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).\n- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).\n- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).\n- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).\n- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).\n- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).\n- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).\n- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).\n- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).\n- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).\n- powerpc/tm: Fix comment (bsc#1118338).\n- powerpc/tm: Fix endianness flip on trap (bsc#1118338).\n- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).\n- powerpc/tm: Fix HTM documentation (bsc#1118338).\n- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).\n- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).\n- powerpc/tm: Print 64-bits MSR (bsc#1118338).\n- powerpc/tm: Print scratch value (bsc#1118338).\n- powerpc/tm: Reformat comments (bsc#1118338).\n- powerpc/tm: Remove msr_tm_active() (bsc#1118338).\n- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).\n- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).\n- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).\n- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).\n- powerpc/tm: Update function prototype comment (bsc#1118338).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).\n- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).\n- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).\n- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).\n- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).\n- ptp_kvm: probe for kvm guest availability (bsc#1098382).\n- ptr_ring: wrap back -\u003eproducer in __ptr_ring_swap_queue() (networking-stable-19_01_04).\n- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).\n- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).\n- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).\n- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).\n- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).\n- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).\n- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).\n- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).\n- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).\n- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).\n- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).\n- RDMA/core: Fix unwinding flow in case of error to register device (bsc#1046306).\n- RDMA/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).\n- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).\n- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).\n- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).\n- Remove blacklist of virtio patch so we can install it (bsc#1114585)\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1051510).\n- Revert \u0027Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G\u0027 (bsc#1051510).\n- Revert \u0027openvswitch: Fix template leak in error cases.\u0027 (bsc#1051510).\n- Revert \u0027scsi: qla2xxx: Fix NVMe Target discovery\u0027 (bsc#1125252).\n- Revert \u0027sd: disable logical block provisioning if \u0027lbpme\u0027 is not set\u0027 This reverts commit e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not accepted upstream.\n- Revert \u0027serial: 8250: Fix clearing FIFOs in RS485 mode again\u0027 (bsc#1051510).\n- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.\n- Revert \u0027xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue\u0027 (bsc#1120854).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).\n- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697) dracut has been using permissions 0600 for the initrd for a long time.\n- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)\n- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).\n- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).\n- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).\n- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).\n- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).\n- s390/early: improve machine detection (git-fixes).\n- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).\n- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).\n- s390/qeth: fix use-after-free in error path (bsc#1127534).\n- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).\n- s390/sthyi: Fix machine name validity indication (git-fixes).\n- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).\n- sata_rcar: fix deferred probing (bsc#1051510).\n- sbus: char: add of_node_put() (bsc#1051510).\n- sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).\n- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- sch_multiq: fix double free on init failure (bsc#1051510).\n- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes\n- scripts/git_sort/git_sort.py: Add s390/linux.git fixes.\n- scripts/git_sort/git_sort.py: add vfs \u0027fixes\u0027 branch\n- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).\n- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).\n- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).\n- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).\n- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).\n- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).\n- scsi: lpfc: fix remoteport access (bsc#1125252).\n- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).\n- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).\n- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).\n- scsi: mpt3sas: Add ioc_\u003clevel\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u003clevel\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u003clevel\u003e with MPT3SAS_FMT to ioc_\u003clevel\u003e (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).\n- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).\n- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).\n- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).\n- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).\n- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).\n- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).\n- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).\n- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).\n- scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).\n- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).\n- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).\n- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).\n- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).\n- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).\n- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).\n- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).\n- sctp: kfree_rcu asoc (networking-stable-18_12_12).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).\n- selftests/livepatch: introduce tests (bsc#1071995).\n- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).\n- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).\n- selinux: always allow mounting submounts (bsc#1051510).\n- selinux: fix GPF on invalid policy (bsc#1051510).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).\n- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).\n- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).\n- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).\n- serial: imx: fix error handling in console_setup (bsc#1051510).\n- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).\n- serial/sunsu: fix refcount leak (bsc#1051510).\n- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).\n- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).\n- signal: Always deliver the kernel\u0027s SIGKILL and SIGSTOP to a pid namespace init (git-fixes).\n- skge: potential memory corruption in skge_get_regs() (bsc#1051510).\n- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).\n- sky2: Increase D3 delay again (bsc#1051510).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).\n- smb3.1.1 dialect is no longer experimental (bsc#1051510).\n- smb311: Fix reconnect (bsc#1051510).\n- smb311: Improve checking of negotiate security contexts (bsc#1051510).\n- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).\n- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).\n- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).\n- smb3: check for and properly advertise directory lease support (bsc#1051510).\n- smb3: directory sync should not return an error (bsc#1051510).\n- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).\n- smb3: do not request leases in symlink creation and query (bsc#1051510).\n- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510).\n- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).\n- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).\n- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).\n- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).\n- smb3: fix various xid leaks (bsc#1051510).\n- smb3: Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510).\n- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).\n- smb3: Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510).\n- smb3: remove noisy warning message on mount (bsc#1129664).\n- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).\n- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).\n- soc/tegra: Do not leak device tree node reference (bsc#1051510).\n- splice: do not merge into linked buffers (git-fixes).\n- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).\n- staging: iio: ad7780: update voltage on read (bsc#1051510).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).\n- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).\n- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).\n- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).\n- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).\n- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).\n- staging: speakup: Replace strncpy with memcpy (bsc#1051510).\n- staging: wilc1000: fix to set correct value for \u0027vif_num\u0027 (bsc#1051510).\n- sunrpc: correct the computation for page_ptr when truncating (git-fixes).\n- sunrpc: Fix a potential race in xprt_connect() (git-fixes).\n- sunrpc: Fix leak of krb5p encode pages (git-fixes).\n- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).\n- sunrpc: safely reallow resvport min/max inversion (git-fixes).\n- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).\n- swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).\n- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).\n- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).\n- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).\n- tcp: batch tcp_net_metrics_exit (bsc#1122982).\n- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).\n- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).\n- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).\n- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).\n- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).\n- tcp: lack of available data can also cause TSO defer (git-fixes).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).\n- team: Free BPF filter when unregistering netdev (bsc#1051510).\n- thermal: do not clear passive state during system sleep (bsc#1051510).\n- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).\n- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).\n- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).\n- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).\n- thermal: mediatek: fix register index error (bsc#1051510).\n- timekeeping: Use proper seqcount initializer (bsc#1051510).\n- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).\n- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).\n- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).\n- tipc: fix a double kfree_skb() (networking-stable-19_01_04).\n- tipc: fix a race condition of releasing subscriber object (bsc#1051510).\n- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).\n- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).\n- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).\n- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).\n- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).\n- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).\n- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).\n- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).\n- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).\n- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).\n- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).\n- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).\n- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).\n- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).\n- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).\n- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).\n- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).\n- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).\n- uevent: add alloc_uevent_skb() helper (bsc#1122982).\n- Update config files. Remove conditional support for SMB2 and SMB3:\n- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).\n- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).\n- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.\n- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).\n- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).\n- usb: Add new USB LPM helpers (bsc#1120902).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).\n- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).\n- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).\n- usb: dwc3: gadget: Clear req-\u003eneeds_extra_trb flag on cleanup (bsc#1120902).\n- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).\n- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).\n- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).\n- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).\n- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).\n- usb: musb: dsps: fix otg state machine (bsc#1051510).\n- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).\n- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).\n- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n- usb: phy: am335x: fix race condition in _probe (bsc#1051510).\n- usb: serial: option: add Fibocom NL678 series (bsc#1120902).\n- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).\n- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).\n- usb: storage: add quirk for SMI SM3350 (bsc#1120902).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).\n- usb: xhci: fix \u0027broken_suspend\u0027 placement in struct xchi_hcd (bsc#1119086).\n- veth: set peer GSO values (bsc#1051510).\n- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n- vfio: ccw: process ssch with interrupts disabled (git-fixes).\n- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).\n- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).\n- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).\n- vhost: log dirty page correctly (networking-stable-19_01_26).\n- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).\n- vhost/vsock: fix uninitialized vhost_vsock-\u003eguest_cid (bsc#1051510).\n- video: clps711x-fb: release disp device node in probe() (bsc#1051510).\n- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).\n- virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).\n- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).\n- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).\n- virtio/s390: avoid race on vcdev-\u003econfig (git-fixes).\n- virtio/s390: fix race in ccw_io_helper() (git-fixes).\n- vmci: Support upto 64-bit PPNs (bsc#1127286).\n- vscok: Send reset control packet when socket is partially bound (networking-stable-19_01_04).\n- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).\n- vt: invoke notifier on screen size change (bsc#1051510).\n- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).\n- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling gro_cells_receive() (git-fixes).\n- vxlan: update skb dst pmtu on tx path (bsc#1123456).\n- w90p910_ether: remove incorrect __init annotation (bsc#1051510).\n- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).\n- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/a.out: Clear the dump structure initially (bsc#1114279).\n- x86/apic: Provide apic_ack_irq() (bsc#1122822).\n- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).\n- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).\n- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).\n- x86/bugs: Add AMD\u0027s variant of SSB_NO (bsc#1114279).\n- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).\n- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).\n- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).\n- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).\n- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).\n- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).\n- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).\n- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).\n- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).\n- x86/vdso: Remove obsolete \u0027fake section table\u0027 reservation (bsc#1114279).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).\n- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).\n- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: fix dom0 boot on huge systems (bsc#1127836).\n- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).\n- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).\n- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).\n- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).\n- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).\n- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).\n- yama: Check for pid death before checking ancestry (bsc#1051510).\n- yama: fix a missing-check bug (bsc#1051510).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).\n- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-784,SUSE-SLE-Module-Basesystem-15-2019-784,SUSE-SLE-Module-Development-Tools-15-2019-784,SUSE-SLE-Module-Development-Tools-OBS-15-2019-784,SUSE-SLE-Module-Legacy-15-2019-784,SUSE-SLE-Module-Live-Patching-15-2019-784,SUSE-SLE-Product-HA-15-2019-784,SUSE-SLE-Product-WE-15-2019-784", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0784-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0784-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0784-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050252", "url": "https://bugzilla.suse.com/1050252" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1054610", "url": "https://bugzilla.suse.com/1054610" }, { "category": "self", "summary": "SUSE Bug 1055121", "url": "https://bugzilla.suse.com/1055121" }, { "category": "self", "summary": "SUSE Bug 1056658", "url": "https://bugzilla.suse.com/1056658" }, { "category": "self", "summary": "SUSE Bug 1056662", "url": "https://bugzilla.suse.com/1056662" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1063638", "url": "https://bugzilla.suse.com/1063638" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1070995", "url": "https://bugzilla.suse.com/1070995" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1084216", "url": "https://bugzilla.suse.com/1084216" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1088133", "url": "https://bugzilla.suse.com/1088133" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098382", "url": "https://bugzilla.suse.com/1098382" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106434", "url": "https://bugzilla.suse.com/1106434" }, { "category": "self", "summary": "SUSE Bug 1106811", "url": "https://bugzilla.suse.com/1106811" }, { "category": "self", "summary": "SUSE Bug 1107078", "url": "https://bugzilla.suse.com/1107078" }, { "category": "self", "summary": "SUSE Bug 1107665", "url": "https://bugzilla.suse.com/1107665" }, { "category": "self", "summary": "SUSE Bug 1108101", "url": "https://bugzilla.suse.com/1108101" }, { "category": "self", "summary": "SUSE Bug 1108870", "url": "https://bugzilla.suse.com/1108870" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1110096", "url": "https://bugzilla.suse.com/1110096" }, { "category": "self", "summary": "SUSE Bug 1110705", "url": "https://bugzilla.suse.com/1110705" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1113042", "url": "https://bugzilla.suse.com/1113042" }, { "category": "self", "summary": "SUSE Bug 1113712", "url": "https://bugzilla.suse.com/1113712" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113939", "url": "https://bugzilla.suse.com/1113939" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114585", "url": "https://bugzilla.suse.com/1114585" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117155", "url": "https://bugzilla.suse.com/1117155" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1118338", "url": "https://bugzilla.suse.com/1118338" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119086", "url": "https://bugzilla.suse.com/1119086" }, { "category": "self", "summary": "SUSE Bug 1119766", "url": "https://bugzilla.suse.com/1119766" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120008", "url": "https://bugzilla.suse.com/1120008" }, { "category": "self", "summary": "SUSE Bug 1120318", "url": "https://bugzilla.suse.com/1120318" }, { "category": "self", "summary": "SUSE Bug 1120601", "url": "https://bugzilla.suse.com/1120601" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120854", "url": "https://bugzilla.suse.com/1120854" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1120909", "url": "https://bugzilla.suse.com/1120909" }, { "category": "self", "summary": "SUSE Bug 1120955", "url": "https://bugzilla.suse.com/1120955" }, { "category": "self", "summary": "SUSE Bug 1121317", "url": "https://bugzilla.suse.com/1121317" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1121789", "url": "https://bugzilla.suse.com/1121789" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122019", "url": "https://bugzilla.suse.com/1122019" }, { "category": "self", "summary": "SUSE Bug 1122192", "url": "https://bugzilla.suse.com/1122192" }, { "category": "self", "summary": "SUSE Bug 1122324", "url": "https://bugzilla.suse.com/1122324" }, { "category": "self", "summary": "SUSE Bug 1122554", "url": "https://bugzilla.suse.com/1122554" }, { "category": "self", "summary": "SUSE Bug 1122662", "url": "https://bugzilla.suse.com/1122662" }, { "category": "self", "summary": "SUSE Bug 1122764", "url": "https://bugzilla.suse.com/1122764" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122822", "url": "https://bugzilla.suse.com/1122822" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1122927", "url": "https://bugzilla.suse.com/1122927" }, { "category": "self", "summary": "SUSE Bug 1122944", "url": "https://bugzilla.suse.com/1122944" }, { "category": "self", "summary": "SUSE Bug 1122971", "url": "https://bugzilla.suse.com/1122971" }, { "category": "self", "summary": "SUSE Bug 1122982", "url": "https://bugzilla.suse.com/1122982" }, { "category": "self", "summary": "SUSE Bug 1123060", "url": "https://bugzilla.suse.com/1123060" }, { "category": "self", "summary": "SUSE Bug 1123061", "url": "https://bugzilla.suse.com/1123061" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1123317", "url": "https://bugzilla.suse.com/1123317" }, { "category": "self", "summary": "SUSE Bug 1123348", "url": "https://bugzilla.suse.com/1123348" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE Bug 1123456", "url": "https://bugzilla.suse.com/1123456" }, { "category": "self", "summary": "SUSE Bug 1123538", "url": "https://bugzilla.suse.com/1123538" }, { "category": "self", "summary": "SUSE Bug 1123697", "url": "https://bugzilla.suse.com/1123697" }, { "category": "self", "summary": "SUSE Bug 1123882", "url": "https://bugzilla.suse.com/1123882" }, { "category": "self", "summary": "SUSE Bug 1123933", "url": "https://bugzilla.suse.com/1123933" }, { "category": "self", "summary": "SUSE Bug 1124055", "url": "https://bugzilla.suse.com/1124055" }, { "category": "self", "summary": "SUSE Bug 1124204", "url": "https://bugzilla.suse.com/1124204" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124579", "url": "https://bugzilla.suse.com/1124579" }, { "category": "self", "summary": "SUSE Bug 1124589", "url": "https://bugzilla.suse.com/1124589" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1124969", "url": "https://bugzilla.suse.com/1124969" }, { "category": "self", "summary": "SUSE Bug 1124974", "url": "https://bugzilla.suse.com/1124974" }, { "category": "self", "summary": "SUSE Bug 1124975", "url": "https://bugzilla.suse.com/1124975" }, { "category": "self", "summary": "SUSE Bug 1124976", "url": "https://bugzilla.suse.com/1124976" }, { "category": "self", "summary": "SUSE Bug 1124978", "url": "https://bugzilla.suse.com/1124978" }, { "category": "self", "summary": "SUSE Bug 1124979", "url": "https://bugzilla.suse.com/1124979" }, { "category": "self", "summary": "SUSE Bug 1124980", "url": "https://bugzilla.suse.com/1124980" }, { "category": "self", "summary": "SUSE Bug 1124981", "url": "https://bugzilla.suse.com/1124981" }, { "category": "self", "summary": "SUSE Bug 1124982", "url": "https://bugzilla.suse.com/1124982" }, { "category": "self", "summary": "SUSE Bug 1124984", "url": "https://bugzilla.suse.com/1124984" }, { "category": "self", "summary": "SUSE Bug 1124985", "url": "https://bugzilla.suse.com/1124985" }, { "category": "self", "summary": "SUSE Bug 1125109", "url": "https://bugzilla.suse.com/1125109" }, { "category": "self", "summary": "SUSE Bug 1125125", "url": "https://bugzilla.suse.com/1125125" }, { "category": "self", "summary": "SUSE Bug 1125252", "url": "https://bugzilla.suse.com/1125252" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125614", "url": "https://bugzilla.suse.com/1125614" }, { "category": "self", "summary": "SUSE Bug 1125728", "url": "https://bugzilla.suse.com/1125728" }, { "category": "self", "summary": "SUSE Bug 1125780", "url": "https://bugzilla.suse.com/1125780" }, { "category": "self", "summary": "SUSE Bug 1125797", "url": "https://bugzilla.suse.com/1125797" }, { "category": "self", "summary": "SUSE Bug 1125799", "url": "https://bugzilla.suse.com/1125799" }, { "category": "self", "summary": "SUSE Bug 1125800", "url": "https://bugzilla.suse.com/1125800" }, { "category": "self", "summary": "SUSE Bug 1125907", "url": "https://bugzilla.suse.com/1125907" }, { "category": "self", "summary": "SUSE Bug 1125947", "url": "https://bugzilla.suse.com/1125947" }, { "category": "self", "summary": "SUSE Bug 1126131", "url": "https://bugzilla.suse.com/1126131" }, { "category": "self", "summary": "SUSE Bug 1126209", "url": "https://bugzilla.suse.com/1126209" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126393", "url": "https://bugzilla.suse.com/1126393" }, { "category": "self", "summary": "SUSE Bug 1126476", "url": "https://bugzilla.suse.com/1126476" }, { "category": "self", "summary": "SUSE Bug 1126480", "url": "https://bugzilla.suse.com/1126480" }, { "category": "self", "summary": "SUSE Bug 1126481", "url": "https://bugzilla.suse.com/1126481" }, { "category": "self", "summary": "SUSE Bug 1126488", "url": "https://bugzilla.suse.com/1126488" }, { "category": "self", "summary": "SUSE Bug 1126495", "url": "https://bugzilla.suse.com/1126495" }, { "category": "self", "summary": "SUSE Bug 1126555", "url": "https://bugzilla.suse.com/1126555" }, { "category": "self", "summary": "SUSE Bug 1126579", "url": "https://bugzilla.suse.com/1126579" }, { "category": "self", "summary": "SUSE Bug 1126789", "url": "https://bugzilla.suse.com/1126789" }, { "category": "self", "summary": "SUSE Bug 1126790", "url": "https://bugzilla.suse.com/1126790" }, { "category": "self", "summary": "SUSE Bug 1126802", "url": "https://bugzilla.suse.com/1126802" }, { "category": "self", "summary": "SUSE Bug 1126803", "url": "https://bugzilla.suse.com/1126803" }, { "category": "self", "summary": "SUSE Bug 1126804", "url": "https://bugzilla.suse.com/1126804" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1126806", "url": "https://bugzilla.suse.com/1126806" }, { "category": "self", "summary": "SUSE Bug 1126807", "url": "https://bugzilla.suse.com/1126807" }, { "category": "self", "summary": "SUSE Bug 1127042", "url": "https://bugzilla.suse.com/1127042" }, { "category": "self", "summary": "SUSE Bug 1127062", "url": "https://bugzilla.suse.com/1127062" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127154", "url": "https://bugzilla.suse.com/1127154" }, { "category": "self", "summary": "SUSE Bug 1127285", "url": "https://bugzilla.suse.com/1127285" }, { "category": "self", "summary": "SUSE Bug 1127286", "url": "https://bugzilla.suse.com/1127286" }, { "category": "self", "summary": "SUSE Bug 1127307", "url": "https://bugzilla.suse.com/1127307" }, { "category": "self", "summary": "SUSE Bug 1127363", "url": "https://bugzilla.suse.com/1127363" }, { "category": "self", "summary": "SUSE Bug 1127493", "url": "https://bugzilla.suse.com/1127493" }, { "category": "self", "summary": "SUSE Bug 1127494", "url": "https://bugzilla.suse.com/1127494" }, { "category": "self", "summary": "SUSE Bug 1127495", "url": "https://bugzilla.suse.com/1127495" }, { "category": "self", "summary": "SUSE Bug 1127496", "url": "https://bugzilla.suse.com/1127496" }, { "category": "self", "summary": "SUSE Bug 1127497", "url": "https://bugzilla.suse.com/1127497" }, { "category": "self", "summary": "SUSE Bug 1127498", "url": "https://bugzilla.suse.com/1127498" }, { "category": "self", "summary": "SUSE Bug 1127534", "url": "https://bugzilla.suse.com/1127534" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127567", "url": "https://bugzilla.suse.com/1127567" }, { "category": "self", "summary": "SUSE Bug 1127595", "url": "https://bugzilla.suse.com/1127595" }, { "category": "self", "summary": "SUSE Bug 1127603", "url": "https://bugzilla.suse.com/1127603" }, { "category": "self", "summary": "SUSE Bug 1127682", "url": "https://bugzilla.suse.com/1127682" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127750", "url": "https://bugzilla.suse.com/1127750" }, { "category": "self", "summary": "SUSE Bug 1127836", "url": "https://bugzilla.suse.com/1127836" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128094", "url": "https://bugzilla.suse.com/1128094" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128351", "url": "https://bugzilla.suse.com/1128351" }, { "category": "self", "summary": "SUSE Bug 1128451", "url": "https://bugzilla.suse.com/1128451" }, { "category": "self", "summary": "SUSE Bug 1128895", "url": "https://bugzilla.suse.com/1128895" }, { "category": "self", "summary": "SUSE Bug 1129046", "url": "https://bugzilla.suse.com/1129046" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129163", "url": "https://bugzilla.suse.com/1129163" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129181", "url": "https://bugzilla.suse.com/1129181" }, { "category": "self", "summary": "SUSE Bug 1129182", "url": "https://bugzilla.suse.com/1129182" }, { "category": "self", "summary": "SUSE Bug 1129183", "url": "https://bugzilla.suse.com/1129183" }, { "category": "self", "summary": "SUSE Bug 1129184", "url": "https://bugzilla.suse.com/1129184" }, { "category": "self", "summary": "SUSE Bug 1129205", "url": "https://bugzilla.suse.com/1129205" }, { "category": "self", "summary": "SUSE Bug 1129281", "url": "https://bugzilla.suse.com/1129281" }, { "category": "self", "summary": "SUSE Bug 1129284", "url": "https://bugzilla.suse.com/1129284" }, { "category": "self", "summary": "SUSE Bug 1129285", "url": "https://bugzilla.suse.com/1129285" }, { "category": "self", "summary": "SUSE Bug 1129291", "url": "https://bugzilla.suse.com/1129291" }, { "category": "self", "summary": "SUSE Bug 1129292", "url": "https://bugzilla.suse.com/1129292" }, { "category": "self", "summary": "SUSE Bug 1129293", "url": "https://bugzilla.suse.com/1129293" }, { "category": "self", "summary": "SUSE Bug 1129294", "url": "https://bugzilla.suse.com/1129294" }, { "category": "self", "summary": "SUSE Bug 1129295", "url": "https://bugzilla.suse.com/1129295" }, { "category": "self", "summary": "SUSE Bug 1129296", "url": "https://bugzilla.suse.com/1129296" }, { "category": "self", "summary": "SUSE Bug 1129326", "url": "https://bugzilla.suse.com/1129326" }, { "category": "self", "summary": "SUSE Bug 1129327", "url": "https://bugzilla.suse.com/1129327" }, { "category": "self", "summary": "SUSE Bug 1129330", "url": "https://bugzilla.suse.com/1129330" }, { "category": "self", "summary": "SUSE Bug 1129363", "url": "https://bugzilla.suse.com/1129363" }, { "category": "self", "summary": "SUSE Bug 1129366", "url": "https://bugzilla.suse.com/1129366" }, { "category": "self", "summary": "SUSE Bug 1129497", "url": "https://bugzilla.suse.com/1129497" }, { "category": "self", "summary": "SUSE Bug 1129519", "url": "https://bugzilla.suse.com/1129519" }, { "category": "self", "summary": "SUSE Bug 1129543", "url": "https://bugzilla.suse.com/1129543" }, { "category": "self", "summary": "SUSE Bug 1129547", "url": "https://bugzilla.suse.com/1129547" }, { "category": "self", "summary": "SUSE Bug 1129551", "url": "https://bugzilla.suse.com/1129551" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129625", "url": "https://bugzilla.suse.com/1129625" }, { "category": "self", "summary": "SUSE Bug 1129664", "url": "https://bugzilla.suse.com/1129664" }, { "category": "self", "summary": "SUSE Bug 1129739", "url": "https://bugzilla.suse.com/1129739" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 824948", "url": "https://bugzilla.suse.com/824948" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20669 page", "url": "https://www.suse.com/security/cve/CVE-2018-20669/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7308 page", "url": "https://www.suse.com/security/cve/CVE-2019-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8980 page", "url": "https://www.suse.com/security/cve/CVE-2019-8980/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-03-28T07:46:41Z", "generator": { "date": "2019-03-28T07:46:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0784-1", "initial_release_date": "2019-03-28T07:46:41Z", "revision_history": [ { "date": "2019-03-28T07:46:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "dtb-al-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-al-4.12.14-150.14.1.aarch64", "product_id": "dtb-al-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-allwinner-4.12.14-150.14.1.aarch64", "product_id": "dtb-allwinner-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-altera-4.12.14-150.14.1.aarch64", "product_id": "dtb-altera-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-amd-4.12.14-150.14.1.aarch64", "product_id": "dtb-amd-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-amlogic-4.12.14-150.14.1.aarch64", "product_id": "dtb-amlogic-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-apm-4.12.14-150.14.1.aarch64", "product_id": "dtb-apm-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-arm-4.12.14-150.14.1.aarch64", "product_id": "dtb-arm-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-broadcom-4.12.14-150.14.1.aarch64", "product_id": "dtb-broadcom-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-cavium-4.12.14-150.14.1.aarch64", "product_id": "dtb-cavium-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-exynos-4.12.14-150.14.1.aarch64", "product_id": "dtb-exynos-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-freescale-4.12.14-150.14.1.aarch64", "product_id": "dtb-freescale-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-hisilicon-4.12.14-150.14.1.aarch64", "product_id": "dtb-hisilicon-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-lg-4.12.14-150.14.1.aarch64", "product_id": "dtb-lg-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-marvell-4.12.14-150.14.1.aarch64", "product_id": "dtb-marvell-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-mediatek-4.12.14-150.14.1.aarch64", "product_id": "dtb-mediatek-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-nvidia-4.12.14-150.14.1.aarch64", "product_id": "dtb-nvidia-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-qcom-4.12.14-150.14.1.aarch64", "product_id": "dtb-qcom-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-renesas-4.12.14-150.14.1.aarch64", "product_id": "dtb-renesas-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-rockchip-4.12.14-150.14.1.aarch64", "product_id": "dtb-rockchip-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-socionext-4.12.14-150.14.1.aarch64", "product_id": "dtb-socionext-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-sprd-4.12.14-150.14.1.aarch64", "product_id": "dtb-sprd-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-xilinx-4.12.14-150.14.1.aarch64", "product_id": "dtb-xilinx-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-zte-4.12.14-150.14.1.aarch64", "product_id": "dtb-zte-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-default-4.12.14-150.14.2.aarch64", "product_id": "kernel-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.14.2.aarch64", "product_id": "kernel-default-base-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.14.2.aarch64", "product_id": "kernel-default-devel-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.14.2.aarch64", "product_id": "kernel-default-extra-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.14.2.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.14.2.aarch64", "product_id": "kernel-obs-build-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.14.2.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.14.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.14.1.aarch64", "product_id": "kernel-syms-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.14.2.aarch64", "product_id": "kernel-vanilla-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.14.2.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.14.2.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.14.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.14.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.14.1.noarch", "product_id": "kernel-devel-4.12.14-150.14.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.14.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.14.1.noarch", "product_id": "kernel-docs-4.12.14-150.14.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.14.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.14.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.14.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.14.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.14.1.noarch", "product_id": "kernel-macros-4.12.14-150.14.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.14.1.noarch", "product": { "name": "kernel-source-4.12.14-150.14.1.noarch", "product_id": "kernel-source-4.12.14-150.14.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.14.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.14.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.14.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "cluster-md-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "dlm-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "dlm-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "gfs2-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "gfs2-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.14.2.ppc64le", "product_id": "kernel-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.14.2.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.14.2.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-debug-extra-4.12.14-150.14.2.ppc64le", "product_id": "kernel-debug-extra-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-debug-livepatch-4.12.14-150.14.2.ppc64le", "product_id": "kernel-debug-livepatch-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-default-4.12.14-150.14.2.ppc64le", "product_id": "kernel-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.14.2.ppc64le", "product_id": "kernel-default-base-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.14.2.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.14.2.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.14.2.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.14.2.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.14.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.14.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.14.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.14.2.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.14.2.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "kselftests-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "kselftests-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "ocfs2-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "reiserfs-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "reiserfs-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.14.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.14.2.s390x", "product_id": "dlm-kmp-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.14.2.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-4.12.14-150.14.2.s390x", "product_id": "kernel-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-base-4.12.14-150.14.2.s390x", "product_id": "kernel-default-base-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.14.2.s390x", "product_id": "kernel-default-devel-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.14.2.s390x", "product_id": "kernel-default-extra-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.14.2.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-man-4.12.14-150.14.2.s390x", "product_id": "kernel-default-man-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.14.2.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.14.2.s390x", "product_id": "kernel-obs-build-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.14.2.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.14.2.s390x", "product_id": "kernel-obs-qa-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.14.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.14.1.s390x", "product_id": "kernel-syms-4.12.14-150.14.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.14.2.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.14.2.s390x", "product_id": "kernel-vanilla-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.14.2.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.14.2.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.14.2.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.14.2.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.14.2.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.14.2.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.14.2.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.14.2.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.14.2.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.14.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "cluster-md-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "cluster-md-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "dlm-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "dlm-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "gfs2-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "gfs2-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-debug-4.12.14-150.14.2.x86_64", "product_id": "kernel-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.14.2.x86_64", "product_id": "kernel-debug-base-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.14.2.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-debug-extra-4.12.14-150.14.2.x86_64", "product_id": "kernel-debug-extra-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-debug-livepatch-4.12.14-150.14.2.x86_64", "product_id": "kernel-debug-livepatch-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-default-4.12.14-150.14.2.x86_64", "product_id": "kernel-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.14.2.x86_64", "product_id": "kernel-default-base-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.14.2.x86_64", "product_id": "kernel-default-devel-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.14.2.x86_64", "product_id": "kernel-default-extra-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.14.2.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.14.2.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.14.2.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.14.2.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "product_id": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.14.2.x86_64", "product_id": "kernel-obs-build-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.14.2.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.14.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.14.1.x86_64", "product_id": "kernel-syms-4.12.14-150.14.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.14.2.x86_64", "product_id": "kernel-vanilla-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.14.2.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.14.2.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "kselftests-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "kselftests-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "ocfs2-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "ocfs2-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "reiserfs-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "reiserfs-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.14.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64" }, "product_reference": "kernel-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.14.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.14.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-zfcpdump-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.14.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.14.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.14.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.14.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.14.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.14.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.14.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.14.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20669" } ], "notes": [ { "category": "general", "text": "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20669", "url": "https://www.suse.com/security/cve/CVE-2018-20669" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2018-20669", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "important" } ], "title": "CVE-2018-20669" }, { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-3819" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "important" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "important" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7308" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7308", "url": "https://www.suse.com/security/cve/CVE-2019-7308" }, { "category": "external", "summary": "SUSE Bug 1124055 for CVE-2019-7308", "url": "https://bugzilla.suse.com/1124055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "important" } ], "title": "CVE-2019-7308" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "important" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-8980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8980" } ], "notes": [ { "category": "general", "text": "A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8980", "url": "https://www.suse.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "SUSE Bug 1126209 for CVE-2019-8980", "url": "https://bugzilla.suse.com/1126209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "low" } ], "title": "CVE-2019-8980" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
suse-su-2019:14127-1
Vulnerability from csaf_suse
Published
2019-07-18 15:53
Modified
2019-07-18 15:53
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-3459: A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel(bnc#1120758).
- CVE-2019-3460: A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before (bnc#1120758).
- CVE-2019-3896: A double-free could happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker could use this flaw for a privilege escalation or for a system crash and a denial of service (DoS) (bnc#1138943).
- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which could lead to a denial of service (bnc#1102340).
- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).
- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).
- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424 1136446).
The following non-security bugs were fixed:
- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).
- fnic: Fix to cleanup aborted IO to avoid device being offlined by mid-layer (bsc#1134835).
- signal: give SEND_SIG_FORCED more power to beat SIGNAL_UNKILLABLE (bsc#1135650).
- signal: oom_kill_task: use SEND_SIG_FORCED instead of force_sig() (bsc#1135650).
- tcp: a regression in the previous fix for the TCP SACK issue was fixed (bnc#1139751)
Patchnames
slessp4-kernel-source-14127,slexsp3-kernel-source-14127
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\nThe SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-3459: A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel(bnc#1120758).\n- CVE-2019-3460: A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before (bnc#1120758).\n- CVE-2019-3896: A double-free could happen in idr_remove_all() in lib/idr.c in the Linux kernel. An unprivileged local attacker could use this flaw for a privilege escalation or for a system crash and a denial of service (DoS) (bnc#1138943).\n- CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which could lead to a denial of service (bnc#1102340).\n- CVE-2018-20836: An issue was discovered in the Linux kernel There was a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free (bnc#1134395).\n- CVE-2019-12614: An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel There was an unchecked kstrdup of prop-name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash) (bnc#1137194).\n- CVE-2019-3846: A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network (bnc#1136424 1136446).\n\nThe following non-security bugs were fixed:\n\n- KEYS: do not let add_key() update an uninstantiated key (bnc#1063416).\n- fnic: Fix to cleanup aborted IO to avoid device being offlined by mid-layer (bsc#1134835).\n- signal: give SEND_SIG_FORCED more power to beat SIGNAL_UNKILLABLE (bsc#1135650).\n- signal: oom_kill_task: use SEND_SIG_FORCED instead of force_sig() (bsc#1135650).\n- tcp: a regression in the previous fix for the TCP SACK issue was fixed (bnc#1139751)\n", "title": "Description of the patch" }, { "category": "details", "text": "slessp4-kernel-source-14127,slexsp3-kernel-source-14127", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_14127-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:14127-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914127-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:14127-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-July/005734.html" }, { "category": "self", "summary": "SUSE Bug 1063416", "url": "https://bugzilla.suse.com/1063416" }, { "category": "self", "summary": "SUSE Bug 1090078", "url": "https://bugzilla.suse.com/1090078" }, { "category": "self", "summary": "SUSE Bug 1102340", "url": "https://bugzilla.suse.com/1102340" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1134395", "url": "https://bugzilla.suse.com/1134395" }, { "category": "self", "summary": "SUSE Bug 1134835", "url": "https://bugzilla.suse.com/1134835" }, { "category": "self", "summary": "SUSE Bug 1135650", "url": "https://bugzilla.suse.com/1135650" }, { "category": "self", "summary": "SUSE Bug 1136424", "url": "https://bugzilla.suse.com/1136424" }, { "category": "self", "summary": "SUSE Bug 1137194", "url": "https://bugzilla.suse.com/1137194" }, { "category": "self", "summary": "SUSE Bug 1138943", "url": "https://bugzilla.suse.com/1138943" }, { "category": "self", "summary": "SUSE Bug 1139751", "url": "https://bugzilla.suse.com/1139751" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20836 page", "url": "https://www.suse.com/security/cve/CVE-2018-20836/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5390 page", "url": "https://www.suse.com/security/cve/CVE-2018-5390/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-12614 page", "url": "https://www.suse.com/security/cve/CVE-2019-12614/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3846 page", "url": "https://www.suse.com/security/cve/CVE-2019-3846/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3896 page", "url": "https://www.suse.com/security/cve/CVE-2019-3896/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-07-18T15:53:32Z", "generator": { "date": "2019-07-18T15:53:32Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:14127-1", "initial_release_date": "2019-07-18T15:53:32Z", "revision_history": [ { "date": "2019-07-18T15:53:32Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.98.1.i586", "product": { "name": "kernel-default-3.0.101-108.98.1.i586", "product_id": "kernel-default-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.98.1.i586", "product": { "name": "kernel-default-base-3.0.101-108.98.1.i586", "product_id": "kernel-default-base-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.98.1.i586", "product": { "name": "kernel-default-devel-3.0.101-108.98.1.i586", "product_id": "kernel-default-devel-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.98.1.i586", "product": { "name": "kernel-ec2-3.0.101-108.98.1.i586", "product_id": "kernel-ec2-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.98.1.i586", "product": { "name": "kernel-ec2-base-3.0.101-108.98.1.i586", "product_id": "kernel-ec2-base-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.98.1.i586", "product": { "name": "kernel-ec2-devel-3.0.101-108.98.1.i586", "product_id": "kernel-ec2-devel-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-pae-3.0.101-108.98.1.i586", "product": { "name": "kernel-pae-3.0.101-108.98.1.i586", "product_id": "kernel-pae-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-pae-base-3.0.101-108.98.1.i586", "product": { "name": "kernel-pae-base-3.0.101-108.98.1.i586", "product_id": "kernel-pae-base-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-pae-devel-3.0.101-108.98.1.i586", "product": { "name": "kernel-pae-devel-3.0.101-108.98.1.i586", "product_id": "kernel-pae-devel-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.98.1.i586", "product": { "name": "kernel-source-3.0.101-108.98.1.i586", "product_id": "kernel-source-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.98.1.i586", "product": { "name": "kernel-syms-3.0.101-108.98.1.i586", "product_id": "kernel-syms-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.98.1.i586", "product": { "name": "kernel-trace-3.0.101-108.98.1.i586", "product_id": "kernel-trace-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.98.1.i586", "product": { "name": "kernel-trace-base-3.0.101-108.98.1.i586", "product_id": "kernel-trace-base-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.98.1.i586", "product": { "name": "kernel-trace-devel-3.0.101-108.98.1.i586", "product_id": "kernel-trace-devel-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.98.1.i586", "product": { "name": "kernel-xen-3.0.101-108.98.1.i586", "product_id": "kernel-xen-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.98.1.i586", "product": { "name": "kernel-xen-base-3.0.101-108.98.1.i586", "product_id": "kernel-xen-base-3.0.101-108.98.1.i586" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.98.1.i586", "product": { "name": "kernel-xen-devel-3.0.101-108.98.1.i586", "product_id": "kernel-xen-devel-3.0.101-108.98.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "kernel-bigmem-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-bigmem-3.0.101-108.98.1.ppc64", "product_id": "kernel-bigmem-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-base-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-bigmem-base-3.0.101-108.98.1.ppc64", "product_id": "kernel-bigmem-base-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "product_id": "kernel-bigmem-devel-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-default-3.0.101-108.98.1.ppc64", "product_id": "kernel-default-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-default-base-3.0.101-108.98.1.ppc64", "product_id": "kernel-default-base-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-default-devel-3.0.101-108.98.1.ppc64", "product_id": "kernel-default-devel-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-ppc64-3.0.101-108.98.1.ppc64", "product_id": "kernel-ppc64-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-base-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-ppc64-base-3.0.101-108.98.1.ppc64", "product_id": "kernel-ppc64-base-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "product_id": "kernel-ppc64-devel-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-source-3.0.101-108.98.1.ppc64", "product_id": "kernel-source-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-syms-3.0.101-108.98.1.ppc64", "product_id": "kernel-syms-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-trace-3.0.101-108.98.1.ppc64", "product_id": "kernel-trace-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-trace-base-3.0.101-108.98.1.ppc64", "product_id": "kernel-trace-base-3.0.101-108.98.1.ppc64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.98.1.ppc64", "product": { "name": "kernel-trace-devel-3.0.101-108.98.1.ppc64", "product_id": "kernel-trace-devel-3.0.101-108.98.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.98.1.s390x", "product": { "name": "kernel-default-3.0.101-108.98.1.s390x", "product_id": "kernel-default-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.98.1.s390x", "product": { "name": "kernel-default-base-3.0.101-108.98.1.s390x", "product_id": "kernel-default-base-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.98.1.s390x", "product": { "name": "kernel-default-devel-3.0.101-108.98.1.s390x", "product_id": "kernel-default-devel-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.0.101-108.98.1.s390x", "product": { "name": "kernel-default-man-3.0.101-108.98.1.s390x", "product_id": "kernel-default-man-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.98.1.s390x", "product": { "name": "kernel-source-3.0.101-108.98.1.s390x", "product_id": "kernel-source-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.98.1.s390x", "product": { "name": "kernel-syms-3.0.101-108.98.1.s390x", "product_id": "kernel-syms-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.98.1.s390x", "product": { "name": "kernel-trace-3.0.101-108.98.1.s390x", "product_id": "kernel-trace-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.98.1.s390x", "product": { "name": "kernel-trace-base-3.0.101-108.98.1.s390x", "product_id": "kernel-trace-base-3.0.101-108.98.1.s390x" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.98.1.s390x", "product": { "name": "kernel-trace-devel-3.0.101-108.98.1.s390x", "product_id": "kernel-trace-devel-3.0.101-108.98.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-default-3.0.101-108.98.1.x86_64", "product_id": "kernel-default-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-default-base-3.0.101-108.98.1.x86_64", "product_id": "kernel-default-base-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-default-devel-3.0.101-108.98.1.x86_64", "product_id": "kernel-default-devel-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-ec2-3.0.101-108.98.1.x86_64", "product_id": "kernel-ec2-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-ec2-base-3.0.101-108.98.1.x86_64", "product_id": "kernel-ec2-base-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-ec2-devel-3.0.101-108.98.1.x86_64", "product_id": "kernel-ec2-devel-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-source-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-source-3.0.101-108.98.1.x86_64", "product_id": "kernel-source-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-syms-3.0.101-108.98.1.x86_64", "product_id": "kernel-syms-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-trace-3.0.101-108.98.1.x86_64", "product_id": "kernel-trace-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-base-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-trace-base-3.0.101-108.98.1.x86_64", "product_id": "kernel-trace-base-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-trace-devel-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-trace-devel-3.0.101-108.98.1.x86_64", "product_id": "kernel-trace-devel-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-xen-3.0.101-108.98.1.x86_64", "product_id": "kernel-xen-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-xen-base-3.0.101-108.98.1.x86_64", "product_id": "kernel-xen-base-3.0.101-108.98.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.0.101-108.98.1.x86_64", "product": { "name": "kernel-xen-devel-3.0.101-108.98.1.x86_64", "product_id": "kernel-xen-devel-3.0.101-108.98.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product": { "name": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-bigmem-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-base-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-bigmem-base-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bigmem-devel-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586" }, "product_reference": "kernel-default-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-default-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-default-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-default-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586" }, "product_reference": "kernel-default-base-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-default-base-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-default-base-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-default-base-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586" }, "product_reference": "kernel-default-devel-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-default-devel-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-default-devel-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-default-devel-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-default-man-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586" }, "product_reference": "kernel-ec2-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-ec2-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586" }, "product_reference": "kernel-ec2-base-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-base-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-ec2-base-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586" }, "product_reference": "kernel-ec2-devel-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586" }, "product_reference": "kernel-pae-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-base-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586" }, "product_reference": "kernel-pae-base-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-pae-devel-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586" }, "product_reference": "kernel-pae-devel-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-ppc64-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-base-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-ppc64-base-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ppc64-devel-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586" }, "product_reference": "kernel-source-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-source-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-source-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-source-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586" }, "product_reference": "kernel-syms-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-syms-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-syms-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-syms-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586" }, "product_reference": "kernel-trace-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-trace-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-trace-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-trace-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586" }, "product_reference": "kernel-trace-base-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-trace-base-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-trace-base-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-base-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-trace-base-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586" }, "product_reference": "kernel-trace-devel-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.98.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64" }, "product_reference": "kernel-trace-devel-3.0.101-108.98.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.98.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x" }, "product_reference": "kernel-trace-devel-3.0.101-108.98.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-trace-devel-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-trace-devel-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586" }, "product_reference": "kernel-xen-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-xen-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586" }, "product_reference": "kernel-xen-base-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-xen-base-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.98.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586" }, "product_reference": "kernel-xen-devel-3.0.101-108.98.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.0.101-108.98.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS", "product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" }, "product_reference": "kernel-xen-devel-3.0.101-108.98.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20836" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20836", "url": "https://www.suse.com/security/cve/CVE-2018-20836" }, { "category": "external", "summary": "SUSE Bug 1134395 for CVE-2018-20836", "url": "https://bugzilla.suse.com/1134395" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-18T15:53:32Z", "details": "moderate" } ], "title": "CVE-2018-20836" }, { "cve": "CVE-2018-5390", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5390" } ], "notes": [ { "category": "general", "text": "Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5390", "url": "https://www.suse.com/security/cve/CVE-2018-5390" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1102682 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1102682" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2018-5390", "url": "https://bugzilla.suse.com/1156434" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-18T15:53:32Z", "details": "important" } ], "title": "CVE-2018-5390" }, { "cve": "CVE-2019-12614", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-12614" } ], "notes": [ { "category": "general", "text": "An issue was discovered in dlpar_parse_cc_property in arch/powerpc/platforms/pseries/dlpar.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup of prop-\u003ename, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-12614", "url": "https://www.suse.com/security/cve/CVE-2019-12614" }, { "category": "external", "summary": "SUSE Bug 1137194 for CVE-2019-12614", "url": "https://bugzilla.suse.com/1137194" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-18T15:53:32Z", "details": "moderate" } ], "title": "CVE-2019-12614" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-18T15:53:32Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-18T15:53:32Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-3846", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3846" } ], "notes": [ { "category": "general", "text": "A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3846", "url": "https://www.suse.com/security/cve/CVE-2019-3846" }, { "category": "external", "summary": "SUSE Bug 1136424 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136424" }, { "category": "external", "summary": "SUSE Bug 1136446 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1136446" }, { "category": "external", "summary": "SUSE Bug 1156330 for CVE-2019-3846", "url": "https://bugzilla.suse.com/1156330" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-18T15:53:32Z", "details": "important" } ], "title": "CVE-2019-3846" }, { "cve": "CVE-2019-3896", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3896" } ], "notes": [ { "category": "general", "text": "A double-free can happen in idr_remove_all() in lib/idr.c in the Linux kernel 2.6 branch. An unprivileged local attacker can use this flaw for a privilege escalation or for a system crash and a denial of service (DoS).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3896", "url": "https://www.suse.com/security/cve/CVE-2019-3896" }, { "category": "external", "summary": "SUSE Bug 1138943 for CVE-2019-3896", "url": "https://bugzilla.suse.com/1138943" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2019-3896", "url": "https://bugzilla.suse.com/1156434" }, { "category": "external", "summary": "SUSE Bug 1173987 for CVE-2019-3896", "url": "https://bugzilla.suse.com/1173987" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.ppc64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.s390x", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.98.1.x86_64", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.i586", "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.98.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-07-18T15:53:32Z", "details": "moderate" } ], "title": "CVE-2019-3896" } ] }
suse-su-2019:0541-1
Vulnerability from csaf_suse
Published
2019-03-04 16:45
Modified
2019-03-04 16:45
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.175 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free. (bnc#1124728)
- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).
- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host's stack memory contents to a guest (bsc#1124735).
- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker could have caused utilities from psutils or procps (such as ps, w) or any other program which made a read() call to the /proc/<pid>/cmdline (or /proc/<pid>/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks) (bnc#1093158).
- CVE-2018-16862: A security flaw was found in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).
- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-5391: The Linux kernel was vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bnc#1103097).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2019-3459,CVE-2019-3460: Two remote information leak vulnerabilities in the Bluetooth stack were fixed that could potentially leak kernel information (bsc#1120758)
The following non-security bugs were fixed:
- 9p: clear dangling pointers in p9stat_free (bnc#1012382).
- 9p locks: fix glock.client_id leak in do_lock (bnc#1012382).
- 9p/net: put a lower bound on msize (bnc#1012382).
- acpi/iort: Fix iort_get_platform_device_domain() uninitialized pointer value (bsc#1121239).
- acpi/lpss: Add alternative ACPI HIDs for Cherry Trail DMA controllers (bnc#1012382).
- acpi/nfit: Block function zero DSMs (bsc#1123321).
- acpi/nfit: Fix ARS overflow continuation (bsc#1125000).
- acpi/nfit: fix cmd_rc for acpi_nfit_ctl to always return a value (bsc#1124775).
- acpi/nfit: Fix command-supported detection (bsc#1123323).
- acpi/nfit, x86/mce: Handle only uncorrectable machine checks (bsc#1114648).
- acpi/nfit, x86/mce: Validate a MCE's address before using it (bsc#1114648).
- acpi/platform: Add SMB0001 HID to forbidden_id_list (bnc#1012382).
- acpi/power: Skip duplicate power resource references in _PRx (bnc#1012382).
- acpi/processor: Fix the return value of acpi_processor_ids_walk() (git fixes (acpi)).
- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bnc#1012382).
- ahci: do not ignore result code of ahci_reset_controller() (bnc#1012382).
- aio: fix spectre gadget in lookup_ioctx (bnc#1012382).
- aio: hold an extra file reference over AIO read/write operations (bsc#1116027).
- alpha: Fix Eiger NR_IRQS to 128 (bnc#1012382).
- alpha: fix page fault handling for r16-r18 targets (bnc#1012382).
- ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write (bnc#1012382).
- ALSA: bebob: fix model-id of unit for Apogee Ensemble (bnc#1012382).
- ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio pops (bnc#1012382).
- ALSA: compress: Fix stop handling on compressed capture streams (bnc#1012382).
- ALSA: control: Fix race between adding and removing a user element (bnc#1012382).
- ALSA: cs46xx: Potential NULL dereference in probe (bnc#1012382).
- ALSA: emu10k1: Fix potential Spectre v1 vulnerabilities (bnc#1012382).
- ALSA: emux: Fix potential Spectre v1 vulnerabilities (bnc#1012382).
- ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bnc#1012382).
- ALSA: hda: add mute LED support for HP EliteBook 840 G4 (bnc#1012382).
- ALSA: hda - Add quirk for HP EliteBook 840 G5 (bnc#1012382).
- ALSA: hda: Add support for AMD Stoney Ridge (bnc#1012382).
- ALSA: hda: Check the non-cached stream buffers more explicitly (bnc#1012382).
- ALSA: hda/realtek - Disable headset Mic VREF for headset mode of ALC225 (bnc#1012382).
- ALSA: hda - Serialize codec registrations (bnc#1012382).
- ALSA: hda/tegra: clear pending irq handlers (bnc#1012382).
- ALSA: isa/wavefront: prevent some out of bound writes (bnc#1012382).
- ALSA: pcm: Call snd_pcm_unlink() conditionally at closing (bnc#1012382).
- ALSA: pcm: Fix interval evaluation with openmin/max (bnc#1012382).
- ALSA: pcm: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ALSA: pcm: Fix starvation on down_write_nonblock() (bnc#1012382).
- ALSA: pcm: remove SNDRV_PCM_IOCTL1_INFO internal command (bnc#1012382).
- ALSA: rme9652: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ALSA: sparc: Fix invalid snd_free_pages() at error path (bnc#1012382).
- ALSA: timer: Fix zero-division by continue of uninitialized instance (bnc#1012382).
- ALSA: trident: Suppress gcc string warning (bnc#1012382).
- ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit() (bnc#1012382).
- ALSA: usb-audio: Fix an out-of-bound read in create_composite_quirks (bnc#1012382).
- ALSA: usb-audio: Fix implicit fb endpoint setup by quirk (bnc#1012382).
- ALSA: wss: Fix invalid snd_free_pages() at error path (bnc#1012382).
- amd/iommu: Fix Guest Virtual APIC Log Tail Address Register (bsc#1106105).
- arc: change defconfig defaults to ARCv2 (bnc#1012382).
- arc: [devboards] Add support of NFSv3 ACL (bnc#1012382).
- arch/alpha, termios: implement BOTHER, IBSHIFT and termios2 (bnc#1012382).
- arc: io.h: Implement reads{x}()/writes{x}() (bnc#1012382).
- arc: perf: map generic branches to correct hardware condition (bnc#1012382).
- arm64: Disable asm-operand-width warning for clang (bnc#1012382).
- arm64: Do not trap host pointer auth use to EL2 (bnc#1012382).
- arm64: dts: stratix10: Correct System Manager register size (bnc#1012382).
- arm64: Enabled ENA (Amazon network driver) for arm64
- arm64: ftrace: do not adjust the LR value (bnc#1012382).
- arm64: hardcode rodata_enabled=true earlier in the series (bsc#1114763).
- arm64: hyp-stub: Forbid kprobing of the hyp-stub (bnc#1012382).
- arm64/kvm: consistently handle host HCR_EL2 flags (bnc#1012382).
- arm64: kvm: Skip MMIO insn after emulation (bnc#1012382).
- arm64: PCI: ACPI support for legacy IRQs parsing and consolidation with DT code (bsc#985031).
- arm64: percpu: Initialize ret in the default case (bnc#1012382).
- arm64: perf: set suppress_bind_attrs flag to true (bnc#1012382).
- arm64: remove no-op -p linker flag (bnc#1012382).
- arm: 8799/1: mm: fix pci_ioremap_io() offset check (bnc#1012382).
- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bnc#1012382).
- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bnc#1012382).
- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bnc#1012382).
- arm: dts: apq8064: add ahci ports-implemented mask (bnc#1012382).
- arm: dts: da850-evm: Correct the sound card name (bnc#1012382).
- arm: dts: Fix OMAP4430 SDP Ethernet startup (bnc#1012382).
- arm: dts: imx53-qsb: disable 1.2GHz OPP (bnc#1012382).
- arm: dts: kirkwood: Fix polarity of GPIO fan lines (bnc#1012382).
- arm: dts: mmp2: fix TWSI2 (bnc#1012382).
- arm: fix mis-applied iommu identity check (bsc#1116924).
- arm: imx: update the cpu power up timing setting on i.mx6sx (bnc#1012382).
- arm: iop32x/n2100: fix PCI IRQ mapping (bnc#1012382).
- arm: kvm: fix building with gcc-8 (bsc#1121241).
- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bnc#1012382).
- arm: OMAP2+: hwmod: Fix some section annotations (bnc#1012382).
- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bnc#1012382).
- arm: pxa: avoid section mismatch warning (bnc#1012382).
- asix: Check for supported Wake-on-LAN modes (bnc#1012382).
- ASoC: ak4613: Enable cache usage to fix crashes on resume (bnc#1012382).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bnc#1012382).
- ASoC: dapm: Recalculate audio map forcely when card instantiated (bnc#1012382).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bnc#1012382).
- ASoC: Intel: mrfld: fix uninitialized variable access (bnc#1012382).
- ASoC: omap-dmic: Add pm_qos handling to avoid overruns with CPU_IDLE (bnc#1012382).
- ASoC: omap-mcpdm: Add pm_qos handling to avoid under/overruns with CPU_IDLE (bnc#1012382).
- ASoC: spear: fix error return code in spdif_in_probe() (bnc#1012382).
- ASoC: wm8940: Enable cache usage to fix crashes on resume (bnc#1012382).
- ata: Fix racy link clearance (bsc#1107866).
- ataflop: fix error handling during setup (bnc#1012382).
- ath10k: fix kernel panic due to race in accessing arvif list (bnc#1012382).
- ath10k: schedule hardware restart if WMI command times out (bnc#1012382).
- ax25: fix a use-after-free in ax25_fillin_cb() (bnc#1012382).
- ax88179_178a: Check for supported Wake-on-LAN modes (bnc#1012382).
- b43: Fix error in cordic routine (bnc#1012382).
- batman-adv: Avoid WARN on net_device without parent in netns (bnc#1012382).
- batman-adv: Expand merged fragment buffer for full packet (bnc#1012382).
- batman-adv: Force mac header to start of data on xmit (bnc#1012382).
- bcache: fix miss key refill->end in writeback (bnc#1012382).
- bfs: add sanity check at bfs_fill_super() (bnc#1012382).
- binfmt_elf: fix calculations for bss padding (bnc#1012382).
- bitops: protect variables in bit_clear_unless() macro (bsc#1116285).
- block: fix inheriting request priority from bio (bsc#1116924).
- block/loop: Use global lock for ioctl() operation (bnc#1012382).
- block: respect virtual boundary mask in bvecs (bsc#1113412).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (Git-fixes).
- Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth (bnc#1012382).
- Bluetooth: Fix unnecessary error message for HCI request completion (bnc#1012382).
- Bluetooth: SMP: fix crash in unpairing (bnc#1012382).
- bna: ethtool: Avoid reading past end of buffer (bnc#1012382).
- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bnc#1012382).
- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).
- bonding: fix 802.3ad state sent to partner when unbinding slave (bnc#1012382).
- bpf: fix check of allowed specifiers in bpf_trace_printk (bnc#1012382).
- bpf: generally move prog destruction to RCU deferral (bnc#1012382).
- bpf: support 8-byte metafield access (bnc#1012382).
- bpf, trace: check event type in bpf_perf_event_read (bsc#1119970).
- bpf, trace: use READ_ONCE for retrieving file ptr (bsc#1119967).
- bpf/verifier: Add spi variable to check_stack_write() (bnc#1012382).
- bpf/verifier: Pass instruction index to check_mem_access() and check_xadd() (bnc#1012382).
- bridge: do not add port to router list when receives query with source 0.0.0.0 (bnc#1012382).
- btrfs: Always try all copies when reading extent buffers (bnc#1012382).
- btrfs: do not attempt to trim devices that do not support it (bnc#1012382).
- btrfs: ensure path name is null terminated at btrfs_control_ioctl (bnc#1012382).
- btrfs: fix backport error in submit_stripe_bio (bsc#1114763).
- btrfs: fix data corruption due to cloning of eof block (bnc#1012382).
- btrfs: Fix memory barriers usage with device stats counters (git-fixes).
- btrfs: fix null pointer dereference on compressed write path error (bnc#1012382).
- btrfs: fix pinned underflow after transaction aborted (bnc#1012382).
- btrfs: fix use-after-free when dumping free space (bnc#1012382).
- btrfs: fix wrong dentries after fsync of file that got its parent replaced (bnc#1012382).
- btrfs: Handle error from btrfs_uuid_tree_rem call in _btrfs_ioctl_set_received_subvol (git-fixes).
- btrfs: Handle owner mismatch gracefully when walking up tree (bnc#1012382).
- btrfs: iterate all devices during trim, instead of fs_devices::alloc_list (bnc#1012382).
- btrfs: locking: Add extra check in btrfs_init_new_buffer() to avoid deadlock (bnc#1012382).
- btrfs: make sure we create all new block groups (bnc#1012382).
- btrfs: qgroup: Dirty all qgroups before rescan (bnc#1012382).
- btrfs: release metadata before running delayed refs (bnc#1012382).
- btrfs: reset max_extent_size on clear in a bitmap (bnc#1012382).
- btrfs: send, fix infinite loop due to directory rename dependencies (bnc#1012382).
- btrfs: set max_extent_size properly (bnc#1012382).
- btrfs: tree-checker: Check level for leaves and nodes (bnc#1012382).
- btrfs: tree-checker: Do not check max block group size as current max chunk size limit is unreliable (fixes for bnc#1012382 bsc#1102875 bsc#1102877 bsc#1102879 bsc#1102882 bsc#1102896).
- btrfs: tree-checker: Fix misleading group system information (bnc#1012382).
- btrfs: tree-check: reduce stack consumption in check_dir_item (bnc#1012382).
- btrfs: validate type when reading a chunk (bnc#1012382).
- btrfs: wait on caching when putting the bg cache (bnc#1012382).
- btrfs: wait on ordered extents on abort cleanup (bnc#1012382).
- cachefiles: fix the race between cachefiles_bury_object() and rmdir(2) (bnc#1012382).
- can: bcm: check timer values before ktime conversion (bnc#1012382).
- can: dev: __can_get_echo_skb(): Do not crash the kernel if can_priv::echo_skb is accessed out of bounds (bnc#1012382).
- can: dev: can_get_echo_skb(): factor out non sending code to __can_get_echo_skb() (bnc#1012382).
- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bnc#1012382).
- can: dev: __can_get_echo_skb(): print error message, if trying to echo non existing skb (bnc#1012382).
- can: dev: __can_get_echo_skb(): replace struct can_frame by canfd_frame to access frame length (bnc#1012382).
- can: gw: ensure DLC boundaries after CAN frame modification (bnc#1012382).
- can: rcar_can: Fix erroneous registration (bnc#1012382).
- cdc-acm: correct counting of UART states in serial state notification (bnc#1012382).
- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bnc#1012382).
- ceph: call setattr_prepare from ceph_setattr instead of inode_change_ok (bsc#1114763).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125809).
- ceph: do not update importing cap's mseq when handing cap export (bsc#1121275).
- ceph: fix dentry leak in ceph_readdir_prepopulate (bsc#1114839).
- ceph: quota: fix null pointer dereference in quota check (bsc#1114839).
- cfg80211: reg: Init wiphy_idx in regulatory_hint_core() (bnc#1012382).
- char/mwave: fix potential Spectre v1 vulnerability (bnc#1012382).
- checkstack.pl: fix for aarch64 (bnc#1012382).
- cifs: Always resolve hostname before reconnecting (bnc#1012382).
- cifs: check ntwrk_buf_start for NULL before dereferencing it (bnc#1012382).
- cifs: Do not count -ENODATA as failure for query directory (bnc#1012382).
- cifs: Do not hide EINTR after sending network packets (bnc#1012382).
- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bnc#1012382).
- cifs: Fix possible hang during async MTU reads and writes (bnc#1012382).
- cifs: Fix potential OOB access of lock element array (bnc#1012382).
- cifs: Fix separator when building path from dentry (bnc#1012382).
- cifs: handle guest access errors to Windows shares (bnc#1012382).
- cifs: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs) (bnc#1012382).
- cifs: Limit memory used by lock request calls to a page (bnc#1012382).
- clk: imx6q: reset exclusive gates on init (bnc#1012382).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bnc#1012382).
- clk: mmp: Off by one in mmp_clk_add() (bnc#1012382).
- clk: s2mps11: Add used attribute to s2mps11_dt_match (git-fixes).
- clk: s2mps11: Fix matching when built as module and DT node contains compatible (bnc#1012382).
- clk: samsung: exynos5420: Enable PERIS clocks for suspend (bnc#1012382).
- clockevents/drivers/i8253: Add support for PIT shutdown quirk (bnc#1012382).
- configfs: replace strncpy with memcpy (bnc#1012382).
- cpufeature: avoid warning when compiling with clang (Git-fixes).
- cpufreq: imx6q: add return value check for voltage scale (bnc#1012382).
- cpufreq: intel_pstate: Fix HWP on boot CPU after system resume (bsc#1120017).
- cpuidle: big.LITTLE: fix refcount leak (bnc#1012382).
- cpuidle: Do not access cpuidle_devices when !CONFIG_CPU_IDLE (bnc#1012382).
- cramfs: fix abad comparison when wrap-arounds occur (bnc#1012382).
- crypto: arm64/sha - avoid non-standard inline asm tricks (bnc#1012382).
- crypto: authencesn - Avoid twice completion call in decrypt path (bnc#1012382).
- crypto: authenc - fix parsing key with misaligned rta_len (bnc#1012382).
- crypto: cts - fix crash on short inputs (bnc#1012382).
- crypto: lrw - Fix out-of bounds access on counter overflow (bnc#1012382).
- crypto: shash - Fix a sleep-in-atomic bug in shash_setkey_unaligned (bnc#1012382).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bnc#1012382).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bnc#1012382).
- crypto, x86: aesni - fix token pasting for clang (bnc#1012382).
- crypto: x86/chacha20 - avoid sleeping with preemption disabled (bnc#1012382).
- cw1200: Do not leak memory if krealloc failes (bnc#1012382).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bnc#1012382).
- cxgb4: Add support for new flash parts (bsc#1102439).
- cxgb4: assume flash part size to be 4MB, if it can't be determined (bsc#1102439).
- cxgb4: Fix FW flash errors (bsc#1102439).
- cxgb4: fix missing break in switch and indent return statements (bsc#1102439).
- cxgb4: support new ISSI flash parts (bsc#1102439).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bnc#1012382).
- debugfs: fix debugfs_rename parameter checking (bnc#1012382).
- debugobjects: avoid recursive calls with kmemleak (bnc#1012382).
- disable stringop truncation warnings for now (bnc#1012382).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bnc#1012382).
- dlm: fixed memory leaks after failed ls_remove_names allocation (bnc#1012382).
- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bnc#1012382).
- dlm: memory leaks on error path in dlm_user_request() (bnc#1012382).
- dlm: possible memory leak on error path in create_lkb() (bnc#1012382).
- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bnc#1012382).
- dmaengine: at_hdmac: fix module unloading (bnc#1012382).
- dmaengine: dma-jz4780: Return error if not probed from DT (bnc#1012382).
- dmaengine: imx-dma: fix wrong callback invoke (bnc#1012382).
- dm cache metadata: ignore hints array being too small during resize (Git-fixes).
- dm crypt: add cryptographic data integrity protection (authenticated encryption) (Git-fixes).
- dm crypt: factor IV constructor out to separate function (Git-fixes).
- dm crypt: fix crash by adding missing check for auth key size (git-fixes).
- dm crypt: fix error return code in crypt_ctr() (git-fixes).
- dm crypt: fix memory leak in crypt_ctr_cipher_old() (git-fixes).
- dm crypt: introduce new format of cipher with 'capi:' prefix (Git-fixes).
- dm crypt: wipe kernel key copy after IV initialization (Git-fixes).
- dm: do not allow readahead to limit IO size (git fixes (readahead)).
- dm ioctl: harden copy_params()'s copy_from_user() from malicious users (bnc#1012382).
- dm kcopyd: Fix bug causing workqueue stalls (bnc#1012382).
- dm-multipath: do not assign cmd_flags in setup_clone() (bsc#1103156).
- dm raid: stop using BUG() in __rdev_sectors() (bsc#1046264).
- dm snapshot: Fix excessive memory usage and workqueue stalls (bnc#1012382).
- dm thin: fix bug where bio that overwrites thin block ignores FUA (bnc#1012382).
- dm thin: stop no_space_timeout worker when switching to write-mode (Git-fixes).
- Documentation/network: reword kernel version reference (bnc#1012382).
- dpaa_eth: fix dpaa_get_stats64 to match prototype (bsc#1114763).
- drbd: Avoid Clang warning about pointless switch statment (bnc#1012382).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bnc#1012382).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bnc#1012382).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bnc#1012382).
- driver/dma/ioat: Call del_timer_sync() without holding prep_lock (bnc#1012382).
- drivers: core: Remove glue dirs from sysfs earlier (bnc#1012382).
- drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl() (bsc#1104098).
- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bnc#1012382).
- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bnc#1012382).
- drivers/sbus/char: add of_node_put() (bnc#1012382).
- drivers/tty: add missing of_node_put() (bnc#1012382).
- drm/ast: change resolution may cause screen blurred (bnc#1012382).
- drm/ast: fixed cursor may disappear sometimes (bnc#1012382).
- drm/ast: fixed reading monitor EDID not stable issue (bnc#1012382).
- drm/ast: Fix incorrect free on ioregs (bsc#1106929)
- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)
- drm/bufs: Fix Spectre v1 vulnerability (bnc#1012382).
- drm/dp_mst: Check if primary mstb is null (bnc#1012382).
- drm/fb-helper: Ignore the value of fb_var_screeninfo.pixclock (bsc#1106929)
- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113766)
- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113766)
- drm/i915: Block fbdev HPD processing during suspend (bsc#1106929)
- drm/i915/hdmi: Add HDMI 2.0 audio clock recovery N values (bnc#1012382).
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1106929)
- drm/ioctl: Fix Spectre v1 vulnerabilities (bnc#1012382).
- drm/modes: Prevent division by zero htotal (bnc#1012382).
- drm/msm: Grab a vblank reference when waiting for commit_done (bnc#1012382).
- drm/nouveau/fbcon: fix oops without fbdev emulation (bnc#1012382).
- drm/omap: fix memory barrier bug in DMM driver (bnc#1012382).
- drm: rcar-du: Fix external clock error checks (bsc#1106929)
- drm: rcar-du: Fix vblank initialization (bsc#1106929)
- drm/rockchip: Allow driver to be shutdown on reboot/kexec (bnc#1012382).
- drm/vmwgfx: Fix setting of dma masks (bsc#1106929)
- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1106929)
- e1000: avoid null pointer dereference on invalid stat type (bnc#1012382).
- e1000e: allow non-monotonic SYSTIM readings (bnc#1012382).
- e1000: fix race condition between e1000_down() and e1000_watchdog (bnc#1012382).
- edac: Raise the maximum number of memory controllers (bsc#1120722).
- efi/libstub/arm64: Force 'hidden' visibility for section markers (bnc#1012382).
- efi/libstub/arm64: Set -fpie when building the EFI stub (bnc#1012382).
- efi/libstub/arm64: Use hidden attribute for struct screen_info reference (bsc#1122650).
- enic: fix checksum validation for IPv6 (bnc#1012382).
- exec: avoid gcc-8 warning for get_task_comm (bnc#1012382).
- exec: load_script: do not blindly truncate shebang string (bnc#1012382).
- exportfs: do not read dentry after free (bnc#1012382).
- ext2: fix potential use after free (bnc#1012382).
- ext4: add missing brelse() add_new_gdb_meta_bg()'s error path (bnc#1012382).
- ext4: add missing brelse() in set_flexbg_block_bitmap()'s error path (bnc#1012382).
- ext4: add missing brelse() update_backups()'s error path (bnc#1012382).
- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bnc#1012382).
- ext4: avoid possible double brelse() in add_new_gdb() on error path (bnc#1012382).
- ext4: avoid potential extra brelse in setup_new_flex_group_blocks() (bnc#1012382).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bnc#1012382).
- ext4: fix argument checking in EXT4_IOC_MOVE_EXT (bnc#1012382).
- ext4: fix buffer leak in __ext4_read_dirblock() on error path (bnc#1012382).
- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bnc#1012382).
- ext4: Fix crash during online resizing (bsc#1122779).
- ext4: fix EXT4_IOC_GROUP_ADD ioctl (bnc#1012382).
- ext4: fix missing cleanup if ext4_alloc_flex_bg_array() fails while resizing (bnc#1012382).
- ext4: fix possible inode leak in the retry loop of ext4_resize_fs() (bnc#1012382).
- ext4: fix possible leak of sbi->s_group_desc_leak in error path (bnc#1012382).
- ext4: fix possible use after free in ext4_quota_enable (bnc#1012382).
- ext4: force inode writes when nfsd calls commit_metadata() (bnc#1012382).
- ext4: initialize retries variable in ext4_da_write_inline_data_begin() (bnc#1012382).
- ext4: missing unlock/put_page() in ext4_try_to_write_inline_data() (bnc#1012382).
- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bnc#1012382).
- f2fs: Add sanity_check_inode() function (bnc#1012382).
- f2fs: avoid unneeded loop in build_sit_entries (bnc#1012382).
- f2fs: check blkaddr more accuratly before issue a bio (bnc#1012382).
- f2fs: clean up argument of recover_data (bnc#1012382).
- f2fs: clean up with is_valid_blkaddr() (bnc#1012382).
- f2fs: detect wrong layout (bnc#1012382).
- f2fs: enhance sanity_check_raw_super() to avoid potential overflow (bnc#1012382).
- f2fs: factor out fsync inode entry operations (bnc#1012382).
- f2fs: fix inode cache leak (bnc#1012382).
- f2fs: fix invalid memory access (bnc#1012382).
- f2fs: fix missing up_read (bnc#1012382).
- f2fs: fix to avoid reading out encrypted data in page cache (bnc#1012382).
- f2fs: fix to convert inline directory correctly (bnc#1012382).
- f2fs: fix to determine start_cp_addr by sbi->cur_cp_pack (bnc#1012382).
- f2fs: fix to do sanity check with block address in main area (bnc#1012382).
- f2fs: fix to do sanity check with block address in main area v2 (bnc#1012382).
- f2fs: fix to do sanity check with cp_pack_start_sum (bnc#1012382).
- f2fs: fix to do sanity check with node footer and iblocks (bnc#1012382).
- f2fs: fix to do sanity check with reserved blkaddr of inline inode (bnc#1012382).
- f2fs: fix to do sanity check with secs_per_zone (bnc#1012382).
- f2fs: fix to do sanity check with user_block_count (bnc#1012382).
- f2fs: fix validation of the block count in sanity_check_raw_super (bnc#1012382).
- f2fs: fix wrong return value of f2fs_acl_create (bnc#1012382).
- f2fs: free meta pages if sanity check for ckpt is failed (bnc#1012382).
- f2fs: give -EINVAL for norecovery and rw mount (bnc#1012382).
- f2fs: introduce and spread verify_blkaddr (bnc#1012382).
- f2fs: introduce get_checkpoint_version for cleanup (bnc#1012382).
- f2fs: move dir data flush to write checkpoint process (bnc#1012382).
- f2fs: move sanity checking of cp into get_valid_checkpoint (bnc#1012382).
- f2fs: not allow to write illegal blkaddr (bnc#1012382).
- f2fs: put directory inodes before checkpoint in roll-forward recovery (bnc#1012382).
- f2fs: read page index before freeing (bnc#1012382).
- f2fs: remove an obsolete variable (bnc#1012382).
- f2fs: return error during fill_super (bnc#1012382).
- f2fs: sanity check on sit entry (bnc#1012382).
- f2fs: use crc and cp version to determine roll-forward recovery (bnc#1012382).
- fbdev: fbcon: Fix unregister crash when more than one framebuffer (bsc#1106929)
- fbdev: fbmem: behave better with small rotated displays and many CPUs (bsc#1106929)
- fcoe: remove duplicate debugging message in fcoe_ctlr_vn_add (bsc#1114763).
- Fix kabi for 'Ensure we commit after writeback is complete' (bsc#1111809).
- Fix problem with sharetransport= and NFSv4 (bsc#1114893).
- floppy: fix race condition in __floppy_read_block_0() (Git-fixes).
- flow_dissector: do not dissect l4 ports for fragments (bnc#1012382).
- fork: record start_time late (bnc#1012382).
- fs: add the fsnotify call to vfs_iter_write (bnc#1012382).
- fscache, cachefiles: remove redundant variable 'cache' (bnc#1012382).
- fscache: fix race between enablement and dropping of object (bsc#1107385).
- fscache: Fix race in fscache_op_complete() due to split atomic_sub & read (Git-fixes).
- fscache: Pass the correct cancelled indications to fscache_op_complete() (Git-fixes).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (bnc#1012382).
- fs: do not scan the inode cache before SB_BORN is set (bnc#1012382).
- fs, elf: make sure to page align bss in load_elf_library (bnc#1012382).
- fs/epoll: drop ovflist branch prediction (bnc#1012382).
- fs/exofs: fix potential memory leak in mount option parsing (bnc#1012382).
- fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters() (bnc#1012382).
- fs: fix lost error code in dio_complete (bsc#1117744).
- fuse: call pipe_buf_release() under pipe lock (bnc#1012382).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bnc#1012382).
- fuse: Dont call set_page_dirty_lock() for ITER_BVEC pages for async_dio (bnc#1012382).
- fuse: fix blocked_waitq wakeup (bnc#1012382).
- fuse: fix leaked notify reply (bnc#1012382).
- fuse: Fix use-after-free in fuse_dev_do_read() (bnc#1012382).
- fuse: Fix use-after-free in fuse_dev_do_write() (bnc#1012382).
- fuse: handle zero sized retrieve correctly (bnc#1012382).
- fuse: set FR_SENT while locked (bnc#1012382).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bnc#1012382).
- genirq: Fix race on spurious interrupt detection (bnc#1012382).
- genwqe: Fix size check (bnc#1012382).
- gfs2: Do not leave s_fs_info pointing to freed memory in init_sbd (bnc#1012382).
- gfs2: Fix loop in gfs2_rbm_find (bnc#1012382).
- gfs2_meta: ->mount() can get NULL dev_name (bnc#1012382).
- gfs2: Put bitmap buffers in put_super (bnc#1012382).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bnc#1012382).
- git_sort.py: Remove non-existent remote tj/libata
- gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB (Git-fixes).
- gpio: max7301: fix driver for use with CONFIG_VMAP_STACK (bnc#1012382).
- gpio: msic: fix error return code in platform_msic_gpio_probe() (bnc#1012382).
- gpio: pl061: handle failed allocations (bnc#1012382).
- gpu: host1x: fix error return code in host1x_probe() (bnc#1012382).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1106929)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1106929)
- gro_cell: add napi_disable in gro_cells_destroy (bnc#1012382).
- hfs: do not free node before using (bnc#1012382).
- hfsplus: do not free node before using (bnc#1012382).
- hfsplus: prevent btree data loss on root split (bnc#1012382).
- hfs: prevent btree data loss on root split (bnc#1012382).
- hid: debug: fix the ring buffer implementation (bnc#1012382).
- hid: hiddev: fix potential Spectre v1 (bnc#1012382).
- hid: lenovo: Add checks to fix of_led_classdev_register (bnc#1012382).
- hid: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges (bnc#1012382).
- hpwdt add dynamic debugging (bsc#1114417).
- hpwdt calculate reload value on each use (bsc#1114417).
- hugetlbfs: dirty pages as they are added to pagecache (bnc#1012382).
- hugetlbfs: fix bug in pgoff overflow checking (bnc#1012382).
- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (bnc#1012382).
- hwmon: (ibmpowernv) Remove bogus __init annotations (bnc#1012382).
- hwmon: (ina2xx) Fix current value calculation (bnc#1012382).
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bnc#1012382).
- hwmon: (lm80) fix a missing check of the status of SMBus read (bnc#1012382).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (git-fixes).
- hwmon: (pmbus) Fix page count auto-detection (bnc#1012382).
- hwmon: (w83795) temp4_type has writable permission (bnc#1012382).
- hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).
- i2c-axxia: check for error conditions first (bnc#1012382).
- i2c: axxia: properly handle master timeout (bnc#1012382).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bnc#1012382).
- i2c: scmi: Fix probe error on devices with an empty SMB0001 ACPI device node (bnc#1012382).
- IB/core: type promotion bug in rdma_rw_init_one_mr() ().
- IB/hfi1: Fix an out-of-bounds access in get_hw_stats ().
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (bnc#1012382).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Convert reset work item mutex to spin lock ().
- ibmvnic: fix accelerated VLAN handling ().
- ibmvnic: fix index in release_rx_pools (bsc#1115440).
- ibmvnic: Fix non-atomic memory allocation in IRQ context ().
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- ibmvnic: remove ndo_poll_controller ().
- ibmvnic: Update driver queues after change in ring size support ().
- ib/rxe: Fix incorrect cache cleanup in error flow ().
- ib/rxe: replace kvfree with vfree ().
- ib/ucm: Fix Spectre v1 vulnerability (bnc#1012382).
- ide: pmac: add of_node_put() (bnc#1012382).
- ieee802154: lowpan_header_create check must check daddr (bnc#1012382).
- igb: Fix an issue that PME is not enabled during runtime suspend (bnc#1012382).
- igb: Remove superfluous reset to PHY and page 0 selection (bnc#1012382).
- iio: adc: at91: fix acking DRDY irq on simple conversions (bnc#1012382).
- iio: adc: at91: fix wrong channel number in triggered buffer mode (bnc#1012382).
- ima: fix showing large 'violations' or 'runtime_measurements_count' (bnc#1012382).
- inet: frags: add a pointer to struct netns_frags (bnc#1012382).
- inet: frags: better deal with smp races (bnc#1012382).
- inet: frags: break the 2GB limit for frags storage (bnc#1012382).
- inet: frags: change inet_frags_init_net() return value (bnc#1012382).
- inet: frags: do not clone skb in ip_expire() (bnc#1012382).
- inet: frags: fix ip6frag_low_thresh boundary (bnc#1012382).
- inet: frags: get rid of ipfrag_skb_cb/FRAG_CB (bnc#1012382).
- inet: frags: get rif of inet_frag_evicting() (bnc#1012382).
- inet: frags: refactor ipfrag_init() (bnc#1012382).
- inet: frags: refactor ipv6_frag_init() (bnc#1012382).
- inet: frags: refactor lowpan_net_frag_init() (bnc#1012382).
- inet: frags: remove inet_frag_maybe_warn_overflow() (bnc#1012382).
- inet: frags: remove some helpers (bnc#1012382).
- inet: frags: reorganize struct netns_frags (bnc#1012382).
- inet: frags: use rhashtables for reassembly units (bnc#1012382).
- Input: bma150 - register input device after setting private data (bnc#1012382).
- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15ARR (bnc#1012382).
- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM (bnc#1012382).
- Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bnc#1012382).
- Input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bnc#1012382).
- Input: elan_i2c - add ELAN0620 to the ACPI table (bnc#1012382).
- Input: elan_i2c - add support for ELAN0621 touchpad (bnc#1012382).
- Input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bnc#1012382).
- Input: matrix_keypad - check for errors from of_get_named_gpio() (bnc#1012382).
- Input: omap-keypad - fix idle configuration to not block SoC idle states (bnc#1012382).
- Input: omap-keypad - fix keyboard debounce configuration (bnc#1012382).
- Input: restore EV_ABS ABS_RESERVED (bnc#1012382).
- Input: xpad - add GPD Win 2 Controller USB IDs (bnc#1012382).
- Input: xpad - add Mad Catz FightStick TE 2 VID/PID (bnc#1012382).
- Input: xpad - add more third-party controllers (bnc#1012382).
- Input: xpad - add PDP device id 0x02a4 (bnc#1012382).
- Input: xpad - add product ID for Xbox One S pad (bnc#1012382).
- Input: xpad - add support for PDP Xbox One controllers (bnc#1012382).
- Input: xpad - add support for SteelSeries Stratus Duo (bnc#1012382).
- Input: xpad - add support for Xbox1 PDP Camo series gamepad (bnc#1012382).
- Input: xpad - add USB IDs for Mad Catz Brawlstick and Razer Sabertooth (bnc#1012382).
- Input: xpad - avoid using __set_bit() for capabilities (bnc#1012382).
- Input: xpad - constify usb_device_id (bnc#1012382).
- Input: xpad - correctly sort vendor id's (bnc#1012382).
- Input: xpad - correct xbox one pad device name (bnc#1012382).
- Input: xpad - do not depend on endpoint order (bnc#1012382).
- Input: xpad - fix GPD Win 2 controller name (bnc#1012382).
- Input: xpad - fix PowerA init quirk for some gamepad models (bnc#1012382).
- Input: xpad - fix rumble on Xbox One controllers with 2015 firmware (bnc#1012382).
- Input: xpad - fix some coding style issues (bnc#1012382).
- Input: xpad - fix stuck mode button on Xbox One S pad (bnc#1012382).
- Input: xpad - fix Xbox One rumble stopping after 2.5 secs (bnc#1012382).
- Input: xpad - handle 'present' and 'gone' correctly (bnc#1012382).
- Input: xpad - move reporting xbox one home button to common function (bnc#1012382).
- Input: xpad - power off wireless 360 controllers on suspend (bnc#1012382).
- Input: xpad - prevent spurious input from wired Xbox 360 controllers (bnc#1012382).
- Input: xpad - quirk all PDP Xbox One gamepads (bnc#1012382).
- Input: xpad - remove spurious events of wireless xpad 360 controller (bnc#1012382).
- Input: xpad - remove unused function (bnc#1012382).
- Input: xpad - restore LED state after device resume (bnc#1012382).
- Input: xpad - simplify error condition in init_output (bnc#1012382).
- Input: xpad - sort supported devices by USB ID (bnc#1012382).
- Input: xpad - support some quirky Xbox One pads (bnc#1012382).
- Input: xpad - sync supported devices with 360Controller (bnc#1012382).
- Input: xpad - sync supported devices with XBCD (bnc#1012382).
- Input: xpad - sync supported devices with xboxdrv (bnc#1012382).
- Input: xpad - update Xbox One Force Feedback Support (bnc#1012382).
- Input: xpad - use LED API when identifying wireless controllers (bnc#1012382).
- Input: xpad - validate USB endpoint type during probe (bnc#1012382).
- Input: xpad - workaround dead irq_out after suspend/ resume (bnc#1012382).
- Input: xpad - xbox one elite controller support (bnc#1012382).
- intel_pstate: Update frequencies of policy->cpus only from ->set_policy() (bsc#1120017).
- intel_th: msu: Fix an off-by-one in attribute store (bnc#1012382).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix amd_iommu=force_isolation (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/arm-smmu: Ensure that page-table updates are visible before TLBI (bsc#1106237).
- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bnc#1012382).
- iommu/ipmmu-vmsa: Fix crash on early domain free (bsc#1106105).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- iommu/vt-d: Fix NULL pointer dereference in prq_event_thread() (bsc#1106105).
- iommu/vt-d: Handle domain agaw being less than iommu agaw (bsc#1106105).
- iommu/vt-d: Use memunmap to free memremap (bsc#1106105).
- ip6mr: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ip: add helpers to process in-order fragments faster (bnc#1012382).
- ipfrag: really prevent allocation on netns exit (bnc#1012382).
- ip: frags: fix crash in ip_do_fragment() (bnc#1012382).
- ipmi: Fix timer race with module unload (bnc#1012382).
- ipmi:ssif: Fix handling of multi-part return messages (bnc#1012382).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (bnc#1012382).
- ip: process in-order fragments efficiently (bnc#1012382).
- ip_tunnel: do not force DF when MTU is locked (bnc#1012382).
- ip_tunnel: Fix name string concatenate in __ip_tunnel_create() (bnc#1012382).
- ip: use rb trees for IP frag queue (bnc#1012382).
- ipv4: Fix potential Spectre v1 vulnerability (bnc#1012382).
- ipv4: frags: precedence bug in ip_expire() (bnc#1012382).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (bsc#1110286).
- ipv6: Check available headroom in ip6_xmit() even without options (bnc#1012382).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (bnc#1012382).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (bnc#1012382).
- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (bnc#1012382).
- ipv6: fix kernel-infoleak in ipv6_local_error() (bnc#1012382).
- ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF (bnc#1012382).
- ipv6: frags: rewrite ip6_expire_frag_queue() (bnc#1012382).
- ipv6: mcast: fix a use-after-free in inet6_mc_check (bnc#1012382).
- ipv6/ndisc: Preserve IPv6 control buffer if protocol error handlers are called (bnc#1012382).
- ipv6: orphan skbs in reassembly unit (bnc#1012382).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ipv6: suppress sparse warnings in IP6_ECN_set_ce() (bnc#1012382).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (bnc#1012382).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bnc#1012382).
- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bnc#1012382).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bnc#1012382).
- iser: set sector for ambiguous mr status errors (bnc#1012382).
- iwlwifi: mvm: fix regulatory domain update when the firmware starts (bnc#1012382).
- iwlwifi: mvm: support sta_statistics() even on older firmware (bnc#1012382).
- ixgbe: Add function for checking to see if we can reuse page (bsc#1100105).
- ixgbe: Add support for build_skb (bsc#1100105).
- ixgbe: Add support for padding packet (bsc#1100105).
- ixgbe: Break out Rx buffer page management (bsc#1100105).
- ixgbe: Fix output from ixgbe_dump (bsc#1100105).
- ixgbe: fix possible race in reset subtask (bsc#1101557).
- ixgbe: Make use of order 1 pages and 3K buffers independent of FCoE (bsc#1100105).
- ixgbe: Only DMA sync frame length (bsc#1100105).
- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bnc#1012382).
- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).
- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).
- ixgbe: Update code to better handle incrementing page count (bsc#1100105).
- ixgbe: Update driver to make use of DMA attributes in Rx path (bsc#1100105).
- ixgbe: Use length to determine if descriptor is done (bsc#1100105).
- jbd2: fix use after free in jbd2_log_do_checkpoint() (bnc#1012382).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bnc#1012382).
- jffs2: free jffs2_sb_info through jffs2_kill_sb() (bnc#1012382).
- kabi: hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).
- kabi: protect get_vaddr_frames (kabi).
- kabi: protect linux/kfifo.h include in hid-debug (kabi).
- kabi: protect struct azx (kabi).
- kabi: protect struct cfs_bandwidth (kabi).
- kabi: protect struct esp (kabi).
- kabi: protect struct fuse_io_priv (kabi).
- kabi: protect struct hda_bus (kabi).
- kabi: protect __usb_get_extra_descriptor (kabi).
- kabi: protect xen/xen-ops.h include in xlate_mmu.c (kabi).
- kabi: reorder new slabinfo fields in struct kmem_cache_node (bnc#1116653).
- kabi: revert sig change on pnfs_read_resend_pnfs (git-fixes).
- kaweth: use skb_cow_head() to deal with cloned skbs (bnc#1012382).
- kbuild: Add better clang cross build support (bnc#1012382).
- kbuild: Add __cc-option macro (bnc#1012382).
- kbuild: Add support to generate LLVM assembly files (bnc#1012382).
- kbuild: allow to use GCC toolchain not in Clang search path (bnc#1012382).
- kbuild: clang: add -no-integrated-as to KBUILD_[AC]FLAGS (bnc#1012382).
- kbuild: clang: Disable 'address-of-packed-member' warning (bnc#1012382).
- kbuild: clang: disable unused variable warnings only when constant (bnc#1012382).
- kbuild: clang: fix build failures with sparse check (bnc#1012382).
- kbuild: clang: remove crufty HOSTCFLAGS (bnc#1012382).
- kbuild: Consolidate header generation from ASM offset information (bnc#1012382).
- kbuild: consolidate redundant sed script ASM offset generation (bnc#1012382).
- kbuild: drop -Wno-unknown-warning-option from clang options (bnc#1012382).
- kbuild: fix asm-offset generation to work with clang (bnc#1012382).
- kbuild: fix kernel/bounds.c 'W=1' warning (bnc#1012382).
- kbuild: fix linker feature test macros when cross compiling with Clang (bnc#1012382).
- kbuild, LLVMLinux: Add -Werror to cc-option to support clang (bnc#1012382).
- kbuild: move cc-option and cc-disable-warning after incl. arch Makefile (bnc#1012382).
- kbuild: Set KBUILD_CFLAGS before incl. arch Makefile (bnc#1012382).
- kbuild: set no-integrated-as before incl. arch Makefile (bnc#1012382).
- kbuild: suppress packed-not-aligned warning for default setting only (bnc#1012382).
- kbuild: use -Oz instead of -Os when using clang (bnc#1012382).
- kconfig: fix file name and line number of warn_ignored_character() (bnc#1012382).
- kconfig: fix memory leak when EOF is encountered in quotation (bnc#1012382).
- kdb: use memmove instead of overlapping memcpy (bnc#1012382).
- kdb: Use strscpy with destination buffer size (bnc#1012382).
- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (bnc#1012382).
- kernel/hung_task.c: break RCU locks based on jiffies (bnc#1012382).
- kernel-source.spec: Align source numbering.
- kernfs: Replace strncpy with memcpy (bnc#1012382).
- keys: put keyring if install_session_keyring_to_cred() fails (bnc#1012382).
- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bnc#1012382).
- kgdboc: Fix restrict error (bnc#1012382).
- kgdboc: Fix warning with module build (bnc#1012382).
- kgdboc: Passing ekgdboc to command line causes panic (bnc#1012382).
- kobject: Replace strncpy with memcpy (bnc#1012382).
- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bnc#1012382).
- kvm/arm64: Fix caching of host MDCR_EL2 value (bsc#1121242).
- kvm/arm: Restore banked registers and physical timer access on hyp_panic() (bsc#1121240).
- kvm/mmu: Fix race in emulated page table writes (bnc#1012382).
- kvm/nvmx: Always reflect #NM VM-exits to L1 (bsc#1106240).
- kvm/nvmx: Eliminate vmcs02 pool (bnc#1012382).
- kvm/nvmx: mark vmcs12 pages dirty on L2 exit (bnc#1012382).
- kvm/ppc: Move and undef TRACE_INCLUDE_PATH/FILE (bnc#1012382).
- kvm/svm: Allow direct access to MSR_IA32_SPEC_CTRL (bnc#1012382 bsc#1068032).
- kvm/svm: Ensure an IBPB on all affected CPUs when freeing a vmcb (bsc#1114648).
- kvm/vmx: Allow direct access to MSR_IA32_SPEC_CTRL (bnc#1012382 bsc#1068032 bsc#1096242 bsc#1096281).
- kvm/vmx: Emulate MSR_IA32_ARCH_CAPABILITIES (bnc#1012382).
- kvm/vmx: Fix x2apic check in vmx_msr_bitmap_mode() (bsc#1124166).
- kvm/vmx: introduce alloc_loaded_vmcs (bnc#1012382).
- kvm/vmx: make MSR bitmaps per-VCPU (bnc#1012382).
- kvm/vmx: Missing part of upstream commit 904e14fb7cb9 (bsc#1124166).
- kvm/x86: Add IBPB support (bnc#1012382 bsc#1068032 bsc#1068032).
- kvm/x86: fix empty-body warnings (bnc#1012382).
- kvm/x86: Fix single-step debugging (bnc#1012382).
- kvm/x86: Remove indirect MSR op calls from SPEC_CTRL (bnc#1012382).
- kvm/x86: svm: report MSR_IA32_MCG_EXT_CTL as unsupported (bnc#1012382).
- kvm/x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bnc#1012382).
- l2tp: copy 4 more bytes to linear part if necessary (bnc#1012382).
- l2tp: fix reading optional fields of L2TPv3 (bnc#1012382).
- l2tp: remove l2specific_len dependency in l2tp_core (bnc#1012382).
- lan78xx: Check for supported Wake-on-LAN modes (bnc#1012382).
- leds: call led_pwm_set() in leds-pwm to enforce default LED_OFF (bnc#1012382).
- leds: leds-gpio: Fix return value check in create_gpio_led() (bnc#1012382).
- leds: turn off the LED and wait for completion on unregistering LED class device (bnc#1012382).
- libata: whitelist all SAMSUNG MZ7KM* solid-state disks (bnc#1012382).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125810).
- libceph: bump CEPH_MSG_MAX_DATA_LEN (bsc#1114839).
- libceph: fall back to sendmsg for slab pages (bsc#1118316).
- libfc: sync strings with upstream versions (bsc#1114763).
- lib/interval_tree_test.c: allow full tree search (bnc#1012382).
- lib/interval_tree_test.c: allow users to limit scope of endpoint (bnc#1012382).
- lib/interval_tree_test.c: make test options module parameters (bnc#1012382).
- libnvdimm, {btt, blk}: do integrity setup before add_disk() (bsc#1118926).
- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (bsc#1118936).
- libnvdimm: fix ars_status output length calculation (bsc#1124777).
- libnvdimm: fix integer overflow static analysis warning (bsc#1118922).
- libnvdimm: fix nvdimm_bus_lock() vs device_lock() ordering (bsc#1118915).
- libnvdimm: Hold reference on parent while scheduling async init (bnc#1012382).
- libnvdimm, pfn: Pad pfn namespaces relative to other regions (bsc#1124811).
- libnvdimm: Use max contiguous area for namespace size (bsc#1124780).
- lib/raid6: Fix arm64 test build (bnc#1012382).
- lib/rbtree_test.c: make input module parameters (bnc#1012382).
- lib/rbtree-test: lower default params (bnc#1012382).
- llc: do not use sk_eat_skb() (bnc#1012382).
- lockd: fix access beyond unterminated strings in prints (bnc#1012382).
- locking/lockdep: Fix debug_locks off performance problem (bnc#1012382).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: Fix double mutex_unlock(&loop_ctl_mutex) in loop_control_ioctl() (bnc#1012382).
- loop: Fold __loop_release into loop_release (bnc#1012382).
- loop: Get rid of loop_index_mutex (bnc#1012382).
- lsm: Check for NULL cred-security on free (bnc#1012382).
- mac80211: Always report TX status (bnc#1012382).
- mac80211: Clear beacon_int in ieee80211_do_stop (bnc#1012382).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bnc#1012382).
- mac80211: fix radiotap vendor presence bitmap handling (bnc#1012382).
- mac80211: fix reordering of buffered broadcast packets (bnc#1012382).
- mac80211_hwsim: do not omit multicast announce of first added radio (bnc#1012382).
- mac80211_hwsim: fix module init error paths for netlink (bnc#1012382).
- mac80211_hwsim: Timer should be initialized before device registered (bnc#1012382).
- mac80211: ignore NullFunc frames in the duplicate detection (bnc#1012382).
- mac80211: ignore tx status for PS stations in ieee80211_tx_status_ext (bnc#1012382).
- mach64: fix display corruption on big endian machines (bnc#1012382).
- mach64: fix image corruption due to reading accelerator registers (bnc#1012382).
- matroxfb: fix size of memcpy (bnc#1012382).
- md: batch flush requests (bsc#1119680).
- md: do not check MD_SB_CHANGE_CLEAN in md_allow_write (Git-fixes).
- md: fix invalid stored role for a disk (bnc#1012382).
- md: fix invalid stored role for a disk - try2 (bnc#1012382).
- md: reorder flag_bits to match upstream commits
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bnc#1012382).
- media: dvb-frontends: fix i2c access helpers for KASAN (bnc#1012382).
- media: em28xx: fix input name for Terratec AV 350 (bnc#1012382).
- media: em28xx: Fix misplaced reset of dev->v4l::field_count (bnc#1012382).
- media: em28xx: Fix use-after-free when disconnecting (bnc#1012382).
- media: em28xx: make v4l2-compliance happier by starting sequence on zero (bnc#1012382).
- media: em28xx: use a default format if TRY_FMT fails (bnc#1012382).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bnc#1012382).
- media: pci: cx23885: handle adding to list failure (bnc#1012382).
- media: tvp5150: fix width alignment during set_selection() (bnc#1012382).
- media: v4l: event: Add subscription to list before calling 'add' operation (bnc#1012382).
- media: vb2: be sure to unlock mutex on errors (bnc#1012382).
- media: vb2: vb2_mmap: move lock up (bnc#1012382).
- media: vivid: fix error handling of kthread_run (bnc#1012382).
- media: vivid: free bitmap_cap when updating std/timings/etc (bnc#1012382).
- media: vivid: set min width/height to a value > 0 (bnc#1012382).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bnc#1012382).
- mfd: tps6586x: Handle interrupts on suspend (bnc#1012382).
- mips: bpf: fix encoding bug for mm_srlv32_op (bnc#1012382).
- mips: cm: reprime error cause (bnc#1012382).
- mips: fix n32 compat_ipc_parse_version (bnc#1012382).
- mips: OCTEON: do not set octeon_dma_bar_type if PCI is disabled (bnc#1012382).
- mips: SiByte: Enable swiotlb for SWARM, LittleSur and BigSur (bnc#1012382).
- mips: VDSO: Include $(ccflags-vdso) in o32,n32 .lds builds (bnc#1012382).
- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bnc#1012382).
- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bnc#1012382).
- misc: vexpress: Off by one in vexpress_syscfg_exec() (bnc#1012382).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bnc#1012382).
- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).
- mmc: core: Reset HPI enabled state during re-init and in case of errors (bnc#1012382).
- mm: cleancache: fix corruption on missed inode invalidation (bnc#1012382).
- mmc: OMAP: fix broken MMC on OMAP15XX/OMAP5910/OMAP310 (bnc#1012382).
- mmc: omap_hsmmc: fix DMA API warning (bnc#1012382).
- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bnc#1012382).
- mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01 (bnc#1012382).
- mm, devm_memremap_pages: kill mapping 'System RAM' support (bnc#1012382).
- mm: do not bug_on on incorrect length in __mm_populate() (bnc#1012382).
- mm: do not miss the last page because of round-off error (bnc#1118798).
- mm, elf: handle vm_brk error (bnc#1012382).
- mm, hugetlb: fix huge_pte_alloc BUG_ON (bsc#1119204).
- mm: hwpoison: call shake_page() after try_to_unmap() for mlocked page (bnc#1116336).
- mm: lower the printk loglevel for __dump_page messages (generic hotplug debugability).
- mm, memory_hotplug: be more verbose for memory offline failures (generic hotplug debugability).
- mm, memory_hotplug: drop pointless block alignment checks from __offline_pages (generic hotplug debugability).
- mm, memory_hotplug: print reason for the offlining failure (generic hotplug debugability).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (bnc#1012382).
- mm: migration: fix migration of huge PMD shared pages (bnc#1012382).
- mm: mlock: avoid increase mm->locked_vm on mlock() when already mlock2(,MLOCK_ONFAULT) (bnc#1012382).
- mm/nommu.c: Switch __get_user_pages_unlocked() to use __get_user_pages() (bnc#1012382).
- mm: only report isolation failures when offlining memory (generic hotplug debugability).
- mm, oom: fix use-after-free in oom_kill_process (bnc#1012382).
- mm, page_alloc: drop should_suppress_show_mem (bnc#1125892, bnc#1106061).
- mm/page-writeback.c: do not break integrity writeback on ->writepage() error (bnc#1012382).
- mm: Preserve _PAGE_DEVMAP across mprotect() calls (bsc#1118790).
- mm: print more information about mapping in __dump_page (generic hotplug debugability).
- mm, proc: be more verbose about unstable VMA flags in /proc/<pid>/smaps (bnc#1012382).
- mm: put_and_wait_on_page_locked() while page is migrated (bnc#1109272).
- mm: refuse wrapped vm_brk requests (bnc#1012382).
- mm: remove write/force parameters from __get_user_pages_locked() (bnc#1012382 bsc#1027260).
- mm: remove write/force parameters from __get_user_pages_unlocked() (bnc#1012382 bsc#1027260).
- mm: replace __access_remote_vm() write parameter with gup_flags (bnc#1012382).
- mm: replace access_remote_vm() write parameter with gup_flags (bnc#1012382).
- mm: replace get_user_pages_locked() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).
- mm: replace get_user_pages_unlocked() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).
- mm: replace get_user_pages() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).
- mm: replace get_vaddr_frames() write/force parameters with gup_flags (bnc#1012382).
- mm, slab: faster active and free stats (bsc#1116653, VM Performance).
- mm/slab: improve performance of gathering slabinfo stats (bsc#1116653, VM Performance).
- mm, slab: maintain total slab count instead of active count (bsc#1116653, VM Performance).
- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).
- modpost: validate symbol names also in find_elf_symbol (bnc#1012382).
- modules: mark __inittest/__exittest as __maybe_unused (bnc#1012382).
- mount: Do not allow copying MNT_UNBINDABLE|MNT_LOCKED mounts (bnc#1012382).
- mount: Prevent MNT_DETACH from disconnecting locked mounts (bnc#1012382).
- mount: Retest MNT_LOCKED in do_umount (bnc#1012382).
- Move patches to sorted range, p1
- Move /proc/sys/vm/procfs-drop-fd-dentries to /proc/sys/fs/procfs-drop-fd-dentries (bsc#1086652) This was incorrectly put in /proc/sys/vm.
- msi: Disable MSI also when pcie-octeon.pcie_disable on (bnc#1012382).
- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bnc#1012382).
- mtd: rawnand: gpmi: fix MX28 bus master lockup problem (bnc#1012382).
- mtd: spi-nor: Add support for is25wp series chips (bnc#1012382).
- mv88e6060: disable hardware level MAC learning (bnc#1012382).
- mwifiex: Fix NULL pointer dereference in skb_dequeue() (bnc#1012382).
- mwifiex: fix p2p device does not find in scan problem (bnc#1012382).
- namei: allow restricted O_CREAT of FIFOs and regular files (bnc#1012382).
- neighbour: Avoid writing before skb->head in neigh_hh_output() (bnc#1012382).
- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (bnc#1012382).
- net/af_iucv: drop inbound packets with invalid flags (bnc#1114475, LTC#172679).
- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1114475, LTC#172679).
- net: amd: add missing of_node_put() (bnc#1012382).
- net: bcmgenet: fix OF child-node lookup (bnc#1012382).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (bnc#1012382).
- net: bridge: Fix ethernet header pointer before check skb forwardable (bnc#1012382).
- net: bridge: remove ipv6 zero address check in mcast queries (bnc#1012382).
- net: call sk_dst_reset when set SO_DONTROUTE (bnc#1012382).
- net: cxgb3_main: fix a missing-check bug (bnc#1012382).
- net: dp83640: expire old TX-skb (bnc#1012382).
- net: drop skb on failure in ip_check_defrag() (bnc#1012382).
- net: drop write-only stack variable (bnc#1012382).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (bnc#1012382).
- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1117562).
- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1117562).
- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1117562).
- net: ena: complete host info to match latest ENA spec (bsc#1117562).
- net: ena: enable Low Latency Queues (bsc#1117562).
- net: ena: explicit casting and initialization, and clearer error handling (bsc#1117562).
- net: ena: fix auto casting to boolean (bsc#1117562).
- net: ena: fix compilation error in xtensa architecture (bsc#1117562).
- net: ena: fix crash during ena_remove() (bsc#1108240).
- net: ena: fix crash during failed resume from hibernation (bsc#1117562).
- net: ena: fix indentations in ena_defs for better readability (bsc#1117562).
- net: ena: Fix Kconfig dependency on X86 (bsc#1117562).
- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1117562).
- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1117562).
- net: ena: fix warning in rmmod caused by double iounmap (bsc#1117562).
- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1117562).
- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1117562).
- net: ena: minor performance improvement (bsc#1117562).
- net: ena: remove ndo_poll_controller (bsc#1117562).
- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1117562).
- net: ena: update driver version from 2.0.1 to 2.0.2 (bsc#1108240).
- net: ena: update driver version to 2.0.1 (bsc#1117562).
- net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1117562).
- net: faraday: ftmac100: remove netif_running(netdev) check before disabling interrupts (bnc#1012382).
- netfilter: ipset: actually allow allowable CIDR 0 in hash:net,port,net (bnc#1012382).
- netfilter: ipset: Correct rcu_dereference() call in ip_set_put_comment() (bnc#1012382).
- netfilter: nf_tables: fix oops when inserting an element into a verdict map (bnc#1012382).
- netfilter: xt_IDLETIMER: add sysfs filename checking routine (bnc#1012382).
- net: fix pskb_trim_rcsum_slow() with odd trim offset (bnc#1012382).
- net: Fix usage of pskb_trim_rcsum (bnc#1012382).
- net-gro: reset skb->pkt_type in napi_reuse_skb() (bnc#1012382).
- net: hisilicon: remove unexpected free_netdev (bnc#1012382).
- net: ibm: fix return type of ndo_start_xmit function ().
- net/ibmnvic: Fix deadlock problem in reset ().
- net/ibmvnic: Fix RTNL deadlock during device reset (bnc#1115431).
- net: ieee802154: 6lowpan: fix frag reassembly (bnc#1012382).
- net/ipv4: defensive cipso option parsing (bnc#1012382).
- net: ipv4: do not handle duplicate fragments as overlapping (bnc#1012382 bsc#1116345).
- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).
- net: ipv4: Fix memory leak in network namespace dismantle (bnc#1012382).
- net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs (bnc#1012382).
- net/mlx4_core: Add masking for a few queries on HCA caps (bnc#1012382).
- net/mlx4_core: Correctly set PFC param if global pause is turned off (bsc#1015336 bsc#1015337 bsc#1015340).
- net/mlx4_core: Fix uninitialized variable compilation warning (bnc#1012382).
- net/mlx4_core: Zero out lkey field in SW2HW_MPT fw command (bnc#1012382).
- net/mlx4: Fix UBSAN warning of signed integer overflow (bnc#1012382).
- net: modify skb_rbtree_purge to return the truesize of all purged skbs (bnc#1012382).
- net: phy: do not allow __set_phy_supported to add unsupported modes (bnc#1012382).
- net: Prevent invalid access to skb->prev in __qdisc_drop_all (bnc#1012382).
- net: pskb_trim_rcsum() and CHECKSUM_COMPLETE are friends (bnc#1012382).
- net: qla3xxx: Remove overflowing shift statement (bnc#1012382).
- netrom: fix locking in nr_find_socket() (bnc#1012382).
- netrom: switch to sock timer API (bnc#1012382).
- net/rose: fix NULL ax25_cb kernel panic (bnc#1012382).
- net: sched: gred: pass the right attribute to gred_change_table_def() (bnc#1012382).
- net_sched: refetch skb protocol for each filter (bnc#1012382).
- net: socket: fix a missing-check bug (bnc#1012382).
- net: speed up skb_rbtree_purge() (bnc#1012382).
- net: stmmac: Fix stmmac_mdio_reset() when building stmmac as modules (bnc#1012382).
- net: systemport: Fix WoL with password after deep sleep (bnc#1012382).
- net: thunderx: fix NULL pointer dereference in nic_remove (bnc#1012382).
- new helper: uaccess_kernel() (bnc#1012382).
- nfc: nfcmrvl_uart: fix OF child-node lookup (bnc#1012382).
- nfc: nxp-nci: Include unaligned.h instead of access_ok.h (bnc#1012382).
- nfit: fix unchecked dereference in acpi_nfit_ctl (bsc#1125014).
- nfit: skip region registration for incomplete control regions (bsc#1118930).
- nfsd4: fix crash on writing v4_end_grace before nfsd startup (bnc#1012382).
- nfsd: Fix an Oops in free_session() (bnc#1012382).
- nfs: Ensure we commit after writeback is complete (bsc#1111809).
- nfs: nfs_compare_mount_options always compare auth flavors (bnc#1012382).
- nfsv4.1: Fix the r/wsize checking (bnc#1012382).
- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- niu: fix missing checks of niu_pci_eeprom_read (bnc#1012382).
- nvme: validate controller state before rescheduling keep alive (bsc#1103257).
- ocfs2: do not clear bh uptodate for block read (bnc#1012382).
- ocfs2: fix a misuse a of brelse after failing ocfs2_check_dir_entry (bnc#1012382).
- ocfs2: fix deadlock caused by ocfs2_defrag_extent() (bnc#1012382).
- ocfs2: fix panic due to unrecovered local alloc (bnc#1012382).
- ocfs2: fix potential use after free (bnc#1012382).
- of: add helper to lookup compatible child node (bnc#1012382).
- omap2fb: Fix stack memory disclosure (bsc#1106929)
- openvswitch: Avoid OOB read when parsing flow nlattrs (bnc#1012382).
- packet: Do not leak dev refcounts on error exit (bnc#1012382).
- packet: validate address length (bnc#1012382).
- packet: validate address length if non-zero (bnc#1012382).
- parisc: Fix address in HPMC IVA (bnc#1012382).
- parisc: Fix map_pages() to not overwrite existing pte entries (bnc#1012382).
- pci: Add Device IDs for Intel GPU 'spurious interrupt' quirk (bnc#1012382).
- pci: altera: Check link status before retrain link (bnc#1012382).
- pci: altera: Fix altera_pcie_link_is_up() (bnc#1012382).
- pci: altera: Move retrain from fixup to altera_pcie_host_init() (bnc#1012382).
- pci: altera: Poll for link training status after retraining the link (bnc#1012382).
- pci: altera: Poll for link up status after retraining the link (bnc#1012382).
- pci: altera: Reorder read/write functions (bnc#1012382).
- pci: altera: Rework config accessors for use without a struct pci_bus (bnc#1012382).
- pci/ASPM: Do not initialize link state when aspm_disabled is set (bsc#1109806).
- pci/ASPM: Fix link_state teardown on device removal (bsc#1109806).
- pci: vmd: Detach resources after stopping root bus (bsc#1106105).
- pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges (bnc#1012382).
- perf/bpf: Convert perf_event_array to use struct file (bsc#1119967).
- perf/core: Do not leak event in the syscall error path (bnc#1012382).
- perf/core: Do not WARN() for impossible ring-buffer sizes (bnc#1012382).
- perf/core: Fix impossible ring-buffer sizes warning (bnc#1012382).
- perf intel-pt: Fix error with config term 'pt=0' (bnc#1012382).
- perf parse-events: Fix unchecked usage of strncpy() (bnc#1012382).
- perf pmu: Suppress potential format-truncation warning (bnc#1012382).
- perf/ring_buffer: Prevent concurent ring buffer access (bnc#1012382).
- perf svghelper: Fix unchecked usage of strncpy() (bnc#1012382).
- perf tests evsel-tp-sched: Fix bitwise operator (bnc#1012382).
- perf tools: Add Hygon Dhyana support (bnc#1012382).
- perf tools: Cleanup trace-event-info 'tdata' leak (bnc#1012382).
- perf tools: Disable parallelism for 'make clean' (bnc#1012382).
- perf tools: Free temporary 'sys' string in read_event_files() (bnc#1012382).
- perf unwind: Take pgoff into account when reporting elf to libdwfl (bnc#1012382).
- perf unwind: Unwind with libdw does not take symfs into account (bnc#1012382).
- perf/x86/intel/uncore: Add Node ID mask (bnc#1012382).
- pinctrl: msm: fix gpio-hog related boot issues (bnc#1012382).
- pinctrl: qcom: spmi-mpp: Fix drive strength setting (bnc#1012382).
- pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux (bnc#1012382).
- pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant (bnc#1012382).
- pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant (bnc#1012382).
- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bnc#1012382).
- platform/x86: acerhdf: Add BIOS entry for Gateway LT31 v1.3307 (bnc#1012382).
- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bnc#1012382).
- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bnc#1012382).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bnc#1012382).
- platform/x86: thinkpad_acpi: Proper model/release matching (bsc#1099810).
- pm / devfreq: tegra: fix error return code in tegra_devfreq_probe() (bnc#1012382).
- pNFS: Fix a deadlock between read resends and layoutreturn (git-fixes).
- pNFS/flexfiles: Fix up the ff_layout_write_pagelist failure path (git-fixes).
- pNFS/flexfiles: When checking for available DSes, conditionally check for MDS io (git-fixes).
- pnfs: set NFS_IOHDR_REDO in pnfs_read_resend_pnfs (git-fixes).
- powerpc/64s: consolidate MCE counter increment (bsc#1094244).
- powerpc/boot: Ensure _zimage_start is a weak symbol (bnc#1012382).
- powerpc/boot: Fix random libfdt related build errors (bnc#1012382).
- powerpc/boot: Request no dynamic linker for boot wrapper (bsc#1070805).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc: Fix COFF zImage booting on old powermacs (bnc#1012382).
- powerpc: handle RFI (exrfi and fallback area) and STF (exrfi).
- powerpc, hotplug: Avoid to touch non-existent cpumasks (bsc#1109695).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- powerpc/mm/radix: Use mm->task_size for boundary checking instead of addr_limit (bsc#1027457).
- powerpc/msi: Fix compile error on mpc83xx (bnc#1012382).
- powerpc/msi: Fix NULL pointer access in teardown code (bnc#1012382).
- powerpc/nohash: fix undefined behaviour when testing page size support (bnc#1012382).
- powerpc/numa: Suppress 'VPHN is not supported' messages (bnc#1012382).
- powerpc/powernv: Do not select the cpufreq governors (bsc#1066223).
- powerpc/powernv: Fix opal_event_shutdown() called with interrupts disabled (bsc#1066223).
- powerpc/powernv/pci: Work around races in PCI bridge enabling (bsc#1066223).
- powerpc/pseries: add of_node_put() in dlpar_detach_node() (bnc#1012382).
- powerpc/pseries/cpuidle: Fix preempt warning (bnc#1012382).
- powerpc/pseries: Fix DTL buffer registration (bsc#1066223).
- powerpc/pseries: Fix how we iterate over the DTL entries (bsc#1066223).
- powerpc/pseries/mobility: Extend start/stop topology update scope (bsc#1116950, bsc#1115709).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/traps: restore recoverability of machine_check interrupts (bsc#1094244).
- powerpc/uaccess: fix warning/error with access_ok() (bnc#1012382).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- power: supply: olpc_battery: correct the temperature units (bnc#1012382).
- printk: Fix panic caused by passing log_buf_len to command line (bnc#1012382).
- proc: Remove empty line in /proc/self/status (bnc#1012382 bsc#1094823).
- Provide a temporary fix for STIBP on-by-default See bsc#1116497 for details.
- pstore: Convert console write to use ->write_buf (bnc#1012382).
- pstore/ram: Do not treat empty buffers as valid (bnc#1012382).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bnc#1012382).
- ptp: fix Spectre v1 vulnerability (bnc#1012382).
- pxa168fb: prepare the clock (bnc#1012382).
- qed: Fix bitmap_weight() check (bsc#1019695).
- qed: Fix PTT leak in qed_drain() (bnc#1012382).
- qed: Fix QM getters to always return a valid pq (bsc#1019695 ).
- qed: Fix reading wrong value in loop condition (bnc#1012382).
- r8152: Check for supported Wake-on-LAN Modes (bnc#1012382).
- r8169: Add support for new Realtek Ethernet (bnc#1012382).
- r8169: fix NAPI handling under high load (bnc#1012382).
- rapidio/rionet: do not free skb before reading its length (bnc#1012382).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125808).
- rcu: Force boolean subscript for expedited stall warnings (bnc#1012382).
- RDMA/bnxt_re: Fix a couple off by one bugs (bsc#1020413, ).
- RDMA/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446).
- RDMA/ucma: Fix Spectre v1 vulnerability (bnc#1012382).
- Refresh patches.kabi/x86-cpufeature-preserve-numbers.patch. (bsc#1122651)
- reiserfs: propagate errors from fill_with_dentries() properly (bnc#1012382).
- Revert 'Bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV' (bnc#1012382).
- Revert 'ceph: fix dentry leak in splice_dentry()' (bsc#1114839).
- Revert 'cifs: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs)' (bnc#1012382).
- Revert 'drm/rockchip: Allow driver to be shutdown on reboot/kexec' (bsc#1106929)
- Revert 'exec: load_script: do not blindly truncate shebang string' (bnc#1012382).
- Revert 'Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G' (bnc#1012382).
- Revert 'iommu/io-pgtable-arm: Check for v7s-incapable systems' (bsc#1106105).
- Revert 'loop: Fix double mutex_unlock(&loop_ctl_mutex) in loop_control_ioctl()' (bnc#1012382).
- Revert 'loop: Fold __loop_release into loop_release' (bnc#1012382).
- Revert 'loop: Get rid of loop_index_mutex' (bnc#1012382).
- Revert 'media: videobuf2-core: do not call memop 'finish' when queueing' (bnc#1012382).
- Revert 'mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).' The backport patch does not built properly.
- Revert 'PCI/ASPM: Do not initialize link state when aspm_disabled is set' (bsc#1106105).
- Revert 'usb: musb: musb_host: Enable HCD_BH flag to handle urb return in bottom half' (bsc#1047487).
- Revert 'wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout()' (bnc#1012382).
- rhashtable: Add rhashtable_lookup() (bnc#1012382).
- rhashtable: add rhashtable_lookup_get_insert_key() (bnc#1012382 bsc#1042286).
- rhashtable: add schedule points (bnc#1012382).
- rhashtable: reorganize struct rhashtable layout (bnc#1012382).
- rocker: fix rocker_tlv_put_* functions for KASAN (bnc#1012382).
- rpcrdma: Add RPCRDMA_HDRLEN_ERR (git-fixes).
- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1042286 bsc#1108145).
- rtc: hctosys: Add missing range error reporting (bnc#1012382).
- rtc: snvs: add a missing write sync (bnc#1012382).
- rtc: snvs: Add timeouts to avoid kernel lockups (bnc#1012382).
- rtnetlink: Disallow FDB configuration for non-Ethernet device (bnc#1012382).
- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (bnc#1012382).
- s390/cpum_cf: Reject request for sampling in event initialization (bnc#1012382).
- s390/early: improve machine detection (bnc#1012382).
- s390/mm: Check for valid vma before zapping in gmap_discard (bnc#1012382).
- s390/mm: Fix ERROR: '__node_distance' undefined! (bnc#1012382).
- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1114475, LTC#172682).
- s390/qeth: fix HiperSockets sniffer (bnc#1114475, LTC#172953).
- s390/qeth: fix length check in SNMP processing (bnc#1012382).
- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1114475, LTC#172682).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (bnc#1012382).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (bnc#1012382).
- s390/vdso: add missing FORCE to build targets (bnc#1012382).
- sata_rcar: fix deferred probing (bnc#1012382).
- sbus: char: add of_node_put() (bnc#1012382).
- sc16is7xx: Fix for multi-channel stall (bnc#1012382).
- sched/cgroup: Fix cgroup entity load tracking tear-down (bnc#1012382).
- sched/fair: Fix throttle_list starvation with low CFS quota (bnc#1012382).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- sch_red: update backlog as well (bnc#1012382).
- scripts/decode_stacktrace: only strip base path when a prefix of the path (bnc#1012382).
- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes
- scsi: aacraid: Fix typo in blink status (bnc#1012382).
- scsi: bfa: convert to strlcpy/strlcat (bnc#1012382 bsc#1019683, ).
- scsi: bnx2fc: Fix NULL dereference in error handling (bnc#1012382).
- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).
- scsi: Create two versions of scsi_internal_device_unblock() (bsc#1119877).
- scsi: csiostor: Avoid content leaks and casts (bnc#1012382).
- scsi: esp_scsi: Track residual for PIO transfers (bnc#1012382).
- scsi: Introduce scsi_start_queue() (bsc#1119877).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1103624, bsc#1104731).
- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).
- scsi: libiscsi: Fix NULL pointer dereference in iscsi_eh_session_reset (bnc#1012382).
- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102660).
- scsi: lpfc: Correct LCB RJT handling (bnc#1012382).
- scsi: lpfc: Correct MDS diag and nvmet configuration (bsc#1125796).
- scsi: lpfc: Correct soft lockup when running mds diagnostics (bnc#1012382).
- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102660).
- scsi: lpfc: Fix abort error path for NVMET (bsc#1102660).
- scsi: lpfc: fix block guard enablement on SLI3 adapters (bsc#1079935).
- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102660).
- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102660).
- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102660).
- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102660).
- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102660).
- scsi: lpfc: update driver version to 11.4.0.7-5 (bsc#1102660).
- scsi: Make __scsi_remove_device go straight from BLOCKED to DEL (bsc#1119877).
- scsi: megaraid: fix out-of-bound array accesses (bnc#1012382).
- scsi: megaraid_sas: fix a missing-check bug (bnc#1012382).
- scsi: mpt3sas: Add an I/O barrier (bsc#1117108).
- scsi: mpt3sas: Added support for nvme encapsulated request message (bsc#1117108).
- scsi: mpt3sas: Added support for SAS Device Discovery Error Event (bsc#1117108).
- scsi: mpt3sas: Adding support for SAS3616 HBA device (bsc#1117108).
- scsi: mpt3sas: Add ioc_<level> logging macros (bsc#1117108).
- scsi: mpt3sas: Add nvme device support in slave alloc, target alloc and probe (bsc#1117108).
- scsi: mpt3sas: Add PCI device ID for Andromeda (bsc#1117108).
- scsi: mpt3sas: Add-Task-management-debug-info-for-NVMe-drives (bsc#1117108).
- scsi: mpt3sas: Allow processing of events during driver unload (bsc#1117108).
- scsi: mpt3sas: always use first reserved smid for ioctl passthrough (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: API's to remove nvme drive from sml (bsc#1117108).
- scsi: mpt3sas: API 's to support NVMe drive addition to SML (bsc#1117108).
- scsi: mpt3sas: As per MPI-spec, use combined reply queue for SAS3.5 controllers when HBA supports more than 16 MSI-x vectors (bsc#1117108).
- scsi: mpt3sas: Bug fix for big endian systems (bsc#1117108).
- scsi: mpt3sas: Bump mpt3sas driver version to v16.100.00.00 (bsc#1117108).
- scsi: mpt3sas: Cache enclosure pages during enclosure add (bsc#1117108).
- scsi: mpt3sas: check command status before attempting abort (bsc#1117108).
- scsi: mpt3sas: clarify mmio pointer types (bsc#1117108).
- scsi: mpt3sas: cleanup _scsih_pcie_enumeration_event() (bsc#1117108).
- scsi: mpt3sas: Configure reply post queue depth, DMA and sgl tablesize (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_<level> with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_<level> with MPT3SAS_FMT to ioc_<level> (bsc#1117108).
- scsi: mpt3sas: Display chassis slot information of the drive (bsc#1117108).
- scsi: mpt3sas: Do not abort I/Os issued to NVMe drives while processing Async Broadcast primitive event (bsc#1117108).
- scsi: mpt3sas: Do not access the structure after decrementing it's instance reference count (bsc#1117108).
- scsi: mpt3sas: Do not use 32-bit atomic request descriptor for Ventura controllers (bsc#1117108).
- scsi: mpt3sas: Enhanced handling of Sense Buffer (bsc#1117108).
- scsi: mpt3sas: fix an out of bound write (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix calltrace observed while running IO & reset (bsc#1117108).
- scsi: mpt3sas: fix dma_addr_t casts (bsc#1117108).
- scsi: mpt3sas: Fixed memory leaks in driver (bsc#1117108).
- scsi: mpt3sas: Fix, False timeout prints for ioctl and other internal commands during controller reset (bsc#1117108).
- scsi: mpt3sas: fix format overflow warning (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Fix memory allocation failure test in 'mpt3sas_base_attach()' (bsc#1117108).
- scsi: mpt3sas: Fix nvme drives checking for tlr (bsc#1117108).
- scsi: mpt3sas: fix oops in error handlers after shutdown/unload (bsc#1117108).
- scsi: mpt3sas: Fix possibility of using invalid Enclosure Handle for SAS device after host reset (bsc#1117108).
- scsi: mpt3sas: fix possible memory leak (bsc#1117108).
- scsi: mpt3sas: fix pr_info message continuation (bsc#1117108).
- scsi: mpt3sas: Fix removal and addition of vSES device during host reset (bsc#1117108).
- scsi: mpt3sas: Fix sparse warnings (bsc#1117108).
- scsi: mpt3sas: fix spelling mistake: 'disbale' -> 'disable' (bsc#1117108).
- scsi: mpt3sas: For NVME device, issue a protocol level reset (bsc#1117108).
- scsi: mpt3sas: Handle NVMe PCIe device related events generated from firmware (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Incorrect command status was set/marked as not used (bsc#1117108).
- scsi: mpt3sas: Increase event log buffer to support 24 port HBA's (bsc#1117108).
- scsi: mpt3sas: Introduce API to get BAR0 mapped buffer address (bsc#1117108).
- scsi: mpt3sas: Introduce Base function for cloning (bsc#1117108).
- scsi: mpt3sas: Introduce function to clone mpi reply (bsc#1117108).
- scsi: mpt3sas: Introduce function to clone mpi request (bsc#1117108).
- scsi: mpt3sas: Introduce mpt3sas_get_st_from_smid() (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Lockless access for chain buffers (bsc#1117108).
- scsi: mpt3sas: lockless command submission (bsc#1117108).
- scsi: mpt3sas: make function _get_st_from_smid static (bsc#1117108).
- scsi: mpt3sas: NVMe drive support for BTDHMAPPING ioctl command and log info (bsc#1117108).
- scsi: mpt3sas: open-code _scsih_scsi_lookup_get() (bsc#1117108).
- scsi: mpt3sas: Optimize I/O memory consumption in driver (bsc#1117108).
- scsi: mpt3sas: Pre-allocate RDPQ Array at driver boot time (bsc#1117108).
- scsi: mpt3sas: Processing of Cable Exception events (bsc#1117108).
- scsi: mpt3sas: Reduce memory footprint in kdump kernel (bsc#1117108).
- scsi: mpt3sas: remove a stray KERN_INFO (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: remove redundant copy_from_user in _ctl_getiocinfo (bsc#1117108).
- scsi: mpt3sas: remove redundant wmb (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Remove unused variable requeue_event (bsc#1117108).
- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).
- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).
- scsi: mpt3sas: Report Firmware Package Version from HBA Driver (bsc#1117108).
- scsi: mpt3sas: scan and add nvme device after controller reset (bsc#1117108).
- scsi: mpt3sas: separate out _base_recovery_check() (bsc#1117108).
- scsi: mpt3sas: set default value for cb_idx (bsc#1117108).
- scsi: mpt3sas: Set NVMe device queue depth as 128 (bsc#1117108).
- scsi: mpt3sas: SGL to PRP Translation for I/Os to NVMe devices (bsc#1117108).
- scsi: mpt3sas: simplify mpt3sas_scsi_issue_tm() (bsc#1117108).
- scsi: mpt3sas: simplify task management functions (bsc#1117108).
- scsi: mpt3sas: simplify _wait_for_commands_to_complete() (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: switch to pci_alloc_irq_vectors (bsc#1117108).
- scsi: mpt3sas: Updated MPI headers to v2.00.48 (bsc#1117108).
- scsi: mpt3sas: Update driver version '25.100.00.00' (bsc#1117108).
- scsi: mpt3sas: Update driver version '26.100.00.00' (bsc#1117108).
- scsi: mpt3sas: Update MPI Headers (bsc#1117108).
- scsi: mpt3sas: Update mpt3sas driver version (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mpt3sas: use list_splice_init() (bsc#1117108).
- scsi: mpt3sas: wait for and flush running commands on shutdown/unload (bsc#1117108).
- scsi: Protect SCSI device state changes with a mutex (bsc#1119877).
- scsi: qedi: Add ISCSI_BOOT_SYSFS to Kconfig (bsc#1043083).
- scsi: qla2xxx: Fix crashes in qla2x00_probe_one on probe failure (bsc#1094973).
- scsi: qla2xxx: Fix deadlock between ATIO and HW lock (bsc#1125794).
- scsi: qla2xxx: Fix incorrect port speed being set for FC adapters (bnc#1012382).
- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure (bsc#1094973).
- scsi: Re-export scsi_internal_device_{,un}_block() (bsc#1119877).
- scsi: sd: Fix cache_type_store() (bnc#1012382).
- scsi: Split scsi_internal_device_block() (bsc#1119877).
- scsi: target: add emulate_pr backstore attr to toggle PR support (bsc#1091405).
- scsi: target: drop unused pi_prot_format attribute storage (bsc#1091405).
- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).
- scsi: target: use consistent left-aligned ASCII INQUIRY data (bnc#1012382).
- scsi: ufs: fix bugs related to null pointer access and array size (bnc#1012382).
- scsi: ufs: fix race between clock gating and devfreq scaling work (bnc#1012382).
- scsi: ufshcd: Fix race between clk scaling and ungate work (bnc#1012382).
- scsi: ufshcd: release resources if probe fails (bnc#1012382).
- scsi: use 'inquiry_mutex' instead of 'state_mutex' (bsc#1119877).
- scsi: vmw_pscsi: Rearrange code to avoid multiple calls to free_irq during unload (bnc#1012382).
- scsi: zfcp: fix posting too many status read buffers leading to adapter shutdown (bnc#1012382).
- sctp: allocate sctp_sockaddr_entry with kzalloc (bnc#1012382).
- sctp: clear the transport of some out_chunk_list chunks in sctp_assoc_rm_peer (bnc#1012382).
- sctp: fix race on sctp_id2asoc (bnc#1012382).
- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (bnc#1012382).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selftests: ftrace: Add synthetic event syntax testcase (bnc#1012382).
- selftests: Move networking/timestamping from Documentation (bnc#1012382).
- selinux: fix GPF on invalid policy (bnc#1012382).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bnc#1012382).
- seq_file: fix incomplete reset on read from zero offset (Git-fixes).
- ser_gigaset: use container_of() instead of detour (bnc#1012382).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bnc#1012382).
- signal: Always deliver the kernel's SIGKILL and SIGSTOP to a pid namespace init (bnc#1012382).
- signal: Always notice exiting tasks (bnc#1012382).
- signal: Better detection of synchronous signals (bnc#1012382).
- signal/GenWQE: Fix sending of SIGKILL (bnc#1012382).
- signal: Restore the stop PTRACE_EVENT_EXIT (bnc#1012382).
- skge: potential memory corruption in skge_get_regs() (bnc#1012382).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (bnc#1012382).
- smack: fix access permissions for keyring (bnc#1012382).
- smb3: allow stats which track session and share reconnects to be reset (bnc#1012382).
- smb3: do not attempt cifs operation in smb3 query info error path (bnc#1012382).
- smb3: on kerberos mount if server does not specify auth type use krb5 (bnc#1012382).
- smsc75xx: Check for Wake-on-LAN modes (bnc#1012382).
- smsc95xx: Check for Wake-on-LAN modes (bnc#1012382).
- smsc95xx: Use skb_cow_head to deal with cloned skbs (bnc#1012382).
- sock: Make sock->sk_stamp thread-safe (bnc#1012382).
- soc/tegra: Do not leak device tree node reference (bnc#1012382).
- soc/tegra: pmc: Fix child-node lookup (bnc#1012382).
- sparc64: Fix exception handling in UltraSPARC-III memcpy (bnc#1012382).
- sparc64 mm: Fix more TSB sizing issues (bnc#1012382).
- sparc: Fix single-pcr perf event counter management (bnc#1012382).
- sparc/pci: Refactor dev_archdata initialization into pci_init_dev_archdata (bnc#1012382).
- spi: bcm2835: Avoid finishing transfer prematurely in IRQ mode (bnc#1012382).
- spi: bcm2835: Fix book-keeping of DMA termination (bnc#1012382).
- spi: bcm2835: Fix race on DMA termination (bnc#1012382).
- spi: bcm2835: Unbreak the build of esoteric configs (bnc#1012382).
- spi/bcm63xx: fix error return code in bcm63xx_spi_probe() (bnc#1012382).
- spi/bcm63xx-hspi: fix error return code in bcm63xx_hsspi_probe() (bnc#1012382).
- spi: xlp: fix error return code in xlp_spi_probe() (bnc#1012382).
- sr9800: Check for supported Wake-on-LAN modes (bnc#1012382).
- sr: pass down correctly sized SCSI sense buffer (bnc#1012382).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bnc#1012382).
- staging: iio: ad7780: update voltage on read (bnc#1012382).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bnc#1012382).
- staging: lustre: remove two build warnings (bnc#1012382).
- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bnc#1012382).
- staging: rts5208: fix gcc-8 logic error warning (bnc#1012382).
- staging: speakup: Replace strncpy with memcpy (bnc#1012382).
- sunrpc: correct the computation for page_ptr when truncating (bnc#1012382).
- sunrpc: drop pointless static qualifier in xdr_get_next_encode_buffer() (bnc#1012382).
- sunrpc: Fix a bogus get/put in generic_key_to_expire() (bnc#1012382).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- sunrpc: fix cache_head leak due to queued request (bnc#1012382).
- sunrpc: Fix leak of krb5p encode pages (bnc#1012382).
- sunrpc: handle ENOMEM in rpcb_getport_async (bnc#1012382).
- sunvdc: Do not spin in an infinite loop when vio_ldc_send() returns EAGAIN (bnc#1012382).
- svcrdma: Remove unused variable in rdma_copy_tail() (git-fixes).
- swim: fix cleanup on setup error (bnc#1012382).
- swiotlb: clean up reporting (bnc#1012382).
- sysfs: Disable lockdep for driver bind/unbind files (bnc#1012382).
- sysv: return 'err' instead of 0 in __sysv_write_inode (bnc#1012382).
- target/iscsi: avoid NULL dereference in CHAP auth error path (bsc#1117165).
- target: se_dev_attrib.emulate_pr ABI stability (bsc#1091405).
- tcp: fix NULL ref in tail loss probe (bnc#1012382).
- TC: Set DMA masks for devices (bnc#1012382).
- termios, tty/tty_baudrate.c: fix buffer overrun (bnc#1012382).
- test_hexdump: use memcpy instead of strncpy (bnc#1012382).
- tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths (bnc#1012382).
- thermal: allow spear-thermal driver to be a module (bnc#1012382).
- thermal: allow u8500-thermal driver to be a module (bnc#1012382).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bnc#1012382).
- timekeeping: Use proper seqcount initializer (bnc#1012382).
- timer/debug: Change /proc/timer_list from 0444 to 0400 (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_doit (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bnc#1012382).
- tipc: use destination length for copy string (bnc#1012382).
- tmpfs: make lseek(SEEK_DATA/SEK_HOLE) return ENXIO with a negative offset (bnc#1012382).
- tpm: fix response size validation in tpm_get_random() (bsc#1020645, git-fixes).
- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bnc#1012382).
- tracing: Fix bad use of igrab in trace_uprobe.c (bsc#1120046).
- tracing: Fix memory leak in set_trigger_filter() (bnc#1012382).
- tracing: Fix memory leak of instance function hash filters (bnc#1012382).
- tracing: Skip more functions when doing stack tracing of events (bnc#1012382).
- tracing/uprobes: Fix output for multiple string arguments (bnc#1012382).
- tty: check name length in tty_find_polling_driver() (bnc#1012382).
- tty: Do not block on IO when ldisc change is pending (bnc#1105428).
- tty: Do not hold ldisc lock in tty_reopen() if ldisc present (bnc#1105428).
- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).
- tty: Handle problem if line discipline does not have receive_buf (bnc#1012382).
- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).
- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).
- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).
- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).
- tty/ldsem: Wake up readers after timed out down_write() (bnc#1012382).
- tty/n_hdlc: fix __might_sleep warning (bnc#1012382).
- tty: serial: 8250_mtk: always resume the device in probe (bnc#1012382).
- tty: serial: samsung: Properly set flags in autoCTS mode (bnc#1012382).
- tty: serial: sprd: fix error return code in sprd_probe() (bnc#1012382).
- tty: Simplify tty->count math in tty_reopen() (bnc#1105428).
- tty: wipe buffer (bnc#1012382).
- tty: wipe buffer if not echoing data (bnc#1012382).
- tun: Consistently configure generic netdev params via rtnetlink (bnc#1012382).
- tun: forbid iface creation with rtnl ops (bnc#1012382).
- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (bnc#1012382).
- uapi/if_ether.h: prevent redefinition of struct ethhdr (bnc#1012382).
- ucc_geth: Reset BQL queue when stopping device (bnc#1012382).
- udf: Fix BUG on corrupted inode (bnc#1012382).
- uio: ensure class is registered before devices (bnc#1012382).
- uio: Fix an Oops on load (bnc#1012382).
- uio: make symbol 'uio_class_registered' static (git-fixes).
- um: Avoid longjmp/setjmp symbol clashes with libpthread.a (bnc#1012382).
- um: Avoid marking pages with 'changed protection' (bnc#1012382).
- um: Give start_idle_thread() a return code (bnc#1012382).
- unifdef: use memcpy instead of strncpy (bnc#1012382).
- Update ibmvnic: Fix RX queue buffer cleanup (bsc#1115440, bsc#1115433).
- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bnc#1012382).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bnc#1012382).
- usb: appledisplay: Add 27' Apple Cinema Display (bnc#1012382).
- usb: cdc-acm: add entry for Hiro (Conexant) modem (bnc#1012382).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bnc#1012382).
- usb: check usb_get_extra_descriptor for proper size (bnc#1012382).
- usb: chipidea: Prevent unbalanced IRQ disable (bnc#1012382).
- usb: core: Fix hub port connection events lost (bnc#1012382).
- usb: core: quirks: add RESET_RESUME quirk for Cherry G230 Stream series (bnc#1012382).
- usb: dwc2: Remove unnecessary kfree (bnc#1012382).
- usb: dwc3: omap: fix error return code in dwc3_omap_probe() (bnc#1012382).
- usb: ehci-omap: fix error return code in ehci_hcd_omap_probe() (bnc#1012382).
- usb: fix the usbfs flag sanitization for control transfers (bnc#1012382).
- usb: gadget: dummy: fix nonsensical comparisons (bnc#1012382).
- usb: gadget: storage: Fix Spectre v1 vulnerability (bnc#1012382).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bnc#1012382).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bnc#1012382).
- usb: imx21-hcd: fix error return code in imx21_probe() (bnc#1012382).
- usb: misc: appledisplay: add 20' Apple Cinema Display (bnc#1012382).
- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (bnc#1012382).
- usb: omap_udc: fix crashes on probe error and module removal (bnc#1012382).
- usb: omap_udc: fix omap_udc_start() on 15xx machines (bnc#1012382).
- usb: omap_udc: fix USB gadget functionality on Palm Tungsten E (bnc#1012382).
- usb: omap_udc: use devm_request_irq() (bnc#1012382).
- usb: phy: am335x: fix race condition in _probe (bnc#1012382).
- usb: quirk: add no-LPM quirk on SanDisk Ultra Flair device (bnc#1012382).
- usb: quirks: Add delay-init quirk for Corsair K70 LUX RGB (bnc#1012382).
- usb: quirks: Add no-lpm quirk for Raydium touchscreens (bnc#1012382).
- usb: r8a66597: Fix a possible concurrency use-after-free bug in r8a66597_endpoint_disable() (bnc#1012382).
- usb: serial: option: add Fibocom NL668 series (bnc#1012382).
- usb: serial: option: add Fibocom NL678 series (bnc#1012382).
- usb: serial: option: add GosunCn ZTE WeLink ME3630 (bnc#1012382).
- usb: serial: option: add HP lt4132 (bnc#1012382).
- usb: serial: option: add Simcom SIM7500/SIM7600 (MBIM mode) (bnc#1012382).
- usb: serial: option: add Telit LN940 series (bnc#1012382).
- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bnc#1012382).
- usb: serial: pl2303: add new PID to support PL2303TB (bnc#1012382).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bnc#1012382).
- usb: storage: add quirk for SMI SM3350 (bnc#1012382).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bnc#1012382).
- usb-storage: fix bogus hardware error messages for ATA pass-thru devices (bnc#1012382).
- usb: usb-storage: Add new IDs to ums-realtek (bnc#1012382).
- usb: xhci: fix timeout for transition from RExit to U0 (bnc#1012382).
- usb: xhci: fix uninitialized completion when USB3 port got wrong status (bnc#1012382).
- usb: xhci: Prevent bus suspend if a port connect change or polling state is detected (bnc#1012382).
- v9fs_dir_readdir: fix double-free on p9stat_read error (bnc#1012382).
- vfs: Avoid softlockups in drop_pagecache_sb() (bsc#1118505).
- vhost: Fix Spectre V1 vulnerability (bnc#1012382).
- vhost: make sure used idx is seen before log in vhost_add_used_n() (bnc#1012382).
- vhost/scsi: truncate T10 PI iov_iter to prot_bytes (bnc#1012382).
- video: clps711x-fb: release disp device node in probe() (bnc#1012382).
- video: fbdev: pxa3xx_gcu: fix error return code in pxa3xx_gcu_probe() (bnc#1012382).
- virtio/s390: avoid race on vcdev->config (bnc#1012382).
- virtio/s390: fix race in ccw_io_helper() (bnc#1012382).
- VSOCK: Send reset control packet when socket is partially bound (bnc#1012382).
- vti6: flush x-netns xfrm cache when vti interface is removed (bnc#1012382).
- vt: invoke notifier on screen size change (bnc#1012382).
- w1: omap-hdq: fix missing bus unregister at removal (bnc#1012382).
- writeback: do not decrement wb->refcnt if !wb->bdi (git fixes (writeback)).
- x86/a.out: Clear the dump structure initially (bnc#1012382).
- x86: boot: Fix EFI stub alignment (bnc#1012382).
- x86/boot: #undef memcpy() et al in string.c (bnc#1012382).
- x86/build: Fix stack alignment for CLang (bnc#1012382).
- x86/build: Specify stack alignment for clang (bnc#1012382).
- x86/build: Use __cc-option for boot code compiler options (bnc#1012382).
- x86/build: Use cc-option to validate stack alignment parameter (bnc#1012382).
- x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided (bnc#1012382).
- x86/earlyprintk/efi: Fix infinite loop on some screen widths (bnc#1012382).
- x86/entry: spell EBX register correctly in documentation (bnc#1012382).
- x86/fpu: Add might_fault() to user_insn() (bnc#1012382).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bnc#1012382).
- x86/kbuild: Use cc-option to enable -falign-{jumps/loops} (bnc#1012382).
- x86/kconfig: Fall back to ticket spinlocks (bnc#1012382).
- x86/MCE: Export memory_error() (bsc#1114648).
- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bnc#1012382).
- x86/MCE: Make correctable error detection look at the Deferred bit (bsc#1114648).
- x86/mm/kaslr: Use the _ASM_MUL macro for multiplication to work around Clang incompatibility (bnc#1012382).
- x86/mm/pat: Prevent hang during boot when mapping pages (bnc#1012382).
- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bnc#1012382).
- x86/PCI: Fix Broadcom CNB20LE unintended sign extension (redux) (bnc#1012382).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1106105).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bnc#1012382).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=off (bnc#1114871).
- x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP (bnc#1012382).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- xen/balloon: Support xend-based toolstack (bnc#1065600).
- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).
- xen: fix race in xen_qlock_wait() (bnc#1012382).
- xen: fix xen_qlock_wait() (bnc#1012382).
- xen: make xen_qlock_wait() nestable (bnc#1012382).
- xen/netback: dont overflow meta array (bnc#1099523).
- xen/netfront: tolerate frags with no data (bnc#1012382).
- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1012382).
- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).
- xen: xlate_mmu: add missing header to fix 'W=1' warning (bnc#1012382).
- xfrm6: call kfree_skb when skb is toobig (bnc#1012382).
- xfrm6_tunnel: Fix spi check in __xfrm6_tunnel_alloc_spi (bnc#1012382).
- xfrm: Clear sk_dst_cache when applying per-socket policy (bnc#1012382).
- xfrm: Fix bucket count reported to userspace (bnc#1012382).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfrm: Validate address prefix lengths in the xfrm selector (bnc#1012382).
- xfrm: validate template mode (bnc#1012382).
- xfs: Align compat attrlist_by_handle with native implementation (git-fixes).
- xfs/dmapi: restore event in xfs_getbmap (bsc#1114763).
- xfs: Fix error code in 'xfs_ioc_getbmap()' (git-fixes).
- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).
- xhci: Add quirk to workaround the errata seen on Cavium Thunder-X2 Soc (bsc#1117162).
- xhci: Do not prevent USB2 bus suspend in state check intended for USB3 only (bnc#1012382).
- xhci: Prevent U1/U2 link pm states if exit latency is too long (bnc#1012382).
- xprtrdma: checking for NULL instead of IS_ERR() (git-fixes).
- xprtrdma: Disable pad optimization by default (git-fixes).
- xprtrdma: Disable RPC/RDMA backchannel debugging messages (git-fixes).
- xprtrdma: Fix additional uses of spin_lock_irqsave(rb_lock) (git-fixes).
- xprtrdma: Fix backchannel allocation of extra rpcrdma_reps (git-fixes).
- xprtrdma: Fix Read chunk padding (git-fixes).
- xprtrdma: Fix receive buffer accounting (git-fixes).
- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).
- xprtrdma: rpcrdma_bc_receive_call() should init rq_private_buf.len (git-fixes).
- xprtrdma: Serialize credit accounting again (git-fixes).
- xprtrdma: xprt_rdma_free() must not release backchannel reqs (git-fixes).
- xtensa: add NOTES section to the linker script (bnc#1012382).
- xtensa: enable coprocessors that are being flushed (bnc#1012382).
- xtensa: fix boot parameters address translation (bnc#1012382).
- xtensa: fix coprocessor context offset definitions (bnc#1012382).
- xtensa: make sure bFLT stack is 16 byte aligned (bnc#1012382).
- yama: Check for pid death before checking ancestry (bnc#1012382).
- zram: close udev startup race condition as default groups (bnc#1012382).
- xfrm: refine validation of template and selector families (bnc#1012382).
Patchnames
SUSE-2019-541,SUSE-SLE-DESKTOP-12-SP3-2019-541,SUSE-SLE-HA-12-SP3-2019-541,SUSE-SLE-Live-Patching-12-SP3-2019-541,SUSE-SLE-SDK-12-SP3-2019-541,SUSE-SLE-SERVER-12-SP3-2019-541,SUSE-SLE-WE-12-SP3-2019-541
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.175 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free. (bnc#1124728)\n- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).\n- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host\u0027s stack memory contents to a guest (bsc#1124735).\n- CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process\u0027s memory containing command line arguments (or environment strings), an attacker could have caused utilities from psutils or procps (such as ps, w) or any other program which made a read() call to the /proc/\u003cpid\u003e/cmdline (or /proc/\u003cpid\u003e/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks) (bnc#1093158).\n- CVE-2018-16862: A security flaw was found in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).\n- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).\n- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).\n- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).\n- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).\n- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).\n- CVE-2018-5391: The Linux kernel was vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bnc#1103097).\n- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).\n- CVE-2019-3459,CVE-2019-3460: Two remote information leak vulnerabilities in the Bluetooth stack were fixed that could potentially leak kernel information (bsc#1120758)\n\nThe following non-security bugs were fixed:\n\n- 9p: clear dangling pointers in p9stat_free (bnc#1012382).\n- 9p locks: fix glock.client_id leak in do_lock (bnc#1012382).\n- 9p/net: put a lower bound on msize (bnc#1012382).\n- acpi/iort: Fix iort_get_platform_device_domain() uninitialized pointer value (bsc#1121239).\n- acpi/lpss: Add alternative ACPI HIDs for Cherry Trail DMA controllers (bnc#1012382).\n- acpi/nfit: Block function zero DSMs (bsc#1123321).\n- acpi/nfit: Fix ARS overflow continuation (bsc#1125000).\n- acpi/nfit: fix cmd_rc for acpi_nfit_ctl to always return a value (bsc#1124775).\n- acpi/nfit: Fix command-supported detection (bsc#1123323).\n- acpi/nfit, x86/mce: Handle only uncorrectable machine checks (bsc#1114648).\n- acpi/nfit, x86/mce: Validate a MCE\u0027s address before using it (bsc#1114648).\n- acpi/platform: Add SMB0001 HID to forbidden_id_list (bnc#1012382).\n- acpi/power: Skip duplicate power resource references in _PRx (bnc#1012382).\n- acpi/processor: Fix the return value of acpi_processor_ids_walk() (git fixes (acpi)).\n- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bnc#1012382).\n- ahci: do not ignore result code of ahci_reset_controller() (bnc#1012382).\n- aio: fix spectre gadget in lookup_ioctx (bnc#1012382).\n- aio: hold an extra file reference over AIO read/write operations (bsc#1116027).\n- alpha: Fix Eiger NR_IRQS to 128 (bnc#1012382).\n- alpha: fix page fault handling for r16-r18 targets (bnc#1012382).\n- ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write (bnc#1012382).\n- ALSA: bebob: fix model-id of unit for Apogee Ensemble (bnc#1012382).\n- ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio pops (bnc#1012382).\n- ALSA: compress: Fix stop handling on compressed capture streams (bnc#1012382).\n- ALSA: control: Fix race between adding and removing a user element (bnc#1012382).\n- ALSA: cs46xx: Potential NULL dereference in probe (bnc#1012382).\n- ALSA: emu10k1: Fix potential Spectre v1 vulnerabilities (bnc#1012382).\n- ALSA: emux: Fix potential Spectre v1 vulnerabilities (bnc#1012382).\n- ALSA: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bnc#1012382).\n- ALSA: hda: add mute LED support for HP EliteBook 840 G4 (bnc#1012382).\n- ALSA: hda - Add quirk for HP EliteBook 840 G5 (bnc#1012382).\n- ALSA: hda: Add support for AMD Stoney Ridge (bnc#1012382).\n- ALSA: hda: Check the non-cached stream buffers more explicitly (bnc#1012382).\n- ALSA: hda/realtek - Disable headset Mic VREF for headset mode of ALC225 (bnc#1012382).\n- ALSA: hda - Serialize codec registrations (bnc#1012382).\n- ALSA: hda/tegra: clear pending irq handlers (bnc#1012382).\n- ALSA: isa/wavefront: prevent some out of bound writes (bnc#1012382).\n- ALSA: pcm: Call snd_pcm_unlink() conditionally at closing (bnc#1012382).\n- ALSA: pcm: Fix interval evaluation with openmin/max (bnc#1012382).\n- ALSA: pcm: Fix potential Spectre v1 vulnerability (bnc#1012382).\n- ALSA: pcm: Fix starvation on down_write_nonblock() (bnc#1012382).\n- ALSA: pcm: remove SNDRV_PCM_IOCTL1_INFO internal command (bnc#1012382).\n- ALSA: rme9652: Fix potential Spectre v1 vulnerability (bnc#1012382).\n- ALSA: sparc: Fix invalid snd_free_pages() at error path (bnc#1012382).\n- ALSA: timer: Fix zero-division by continue of uninitialized instance (bnc#1012382).\n- ALSA: trident: Suppress gcc string warning (bnc#1012382).\n- ALSA: usb-audio: Avoid access before bLength check in build_audio_procunit() (bnc#1012382).\n- ALSA: usb-audio: Fix an out-of-bound read in create_composite_quirks (bnc#1012382).\n- ALSA: usb-audio: Fix implicit fb endpoint setup by quirk (bnc#1012382).\n- ALSA: wss: Fix invalid snd_free_pages() at error path (bnc#1012382).\n- amd/iommu: Fix Guest Virtual APIC Log Tail Address Register (bsc#1106105).\n- arc: change defconfig defaults to ARCv2 (bnc#1012382).\n- arc: [devboards] Add support of NFSv3 ACL (bnc#1012382).\n- arch/alpha, termios: implement BOTHER, IBSHIFT and termios2 (bnc#1012382).\n- arc: io.h: Implement reads{x}()/writes{x}() (bnc#1012382).\n- arc: perf: map generic branches to correct hardware condition (bnc#1012382).\n- arm64: Disable asm-operand-width warning for clang (bnc#1012382).\n- arm64: Do not trap host pointer auth use to EL2 (bnc#1012382).\n- arm64: dts: stratix10: Correct System Manager register size (bnc#1012382).\n- arm64: Enabled ENA (Amazon network driver) for arm64\n- arm64: ftrace: do not adjust the LR value (bnc#1012382).\n- arm64: hardcode rodata_enabled=true earlier in the series (bsc#1114763).\n- arm64: hyp-stub: Forbid kprobing of the hyp-stub (bnc#1012382).\n- arm64/kvm: consistently handle host HCR_EL2 flags (bnc#1012382).\n- arm64: kvm: Skip MMIO insn after emulation (bnc#1012382).\n- arm64: PCI: ACPI support for legacy IRQs parsing and consolidation with DT code (bsc#985031).\n- arm64: percpu: Initialize ret in the default case (bnc#1012382).\n- arm64: perf: set suppress_bind_attrs flag to true (bnc#1012382).\n- arm64: remove no-op -p linker flag (bnc#1012382).\n- arm: 8799/1: mm: fix pci_ioremap_io() offset check (bnc#1012382).\n- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bnc#1012382).\n- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bnc#1012382).\n- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bnc#1012382).\n- arm: dts: apq8064: add ahci ports-implemented mask (bnc#1012382).\n- arm: dts: da850-evm: Correct the sound card name (bnc#1012382).\n- arm: dts: Fix OMAP4430 SDP Ethernet startup (bnc#1012382).\n- arm: dts: imx53-qsb: disable 1.2GHz OPP (bnc#1012382).\n- arm: dts: kirkwood: Fix polarity of GPIO fan lines (bnc#1012382).\n- arm: dts: mmp2: fix TWSI2 (bnc#1012382).\n- arm: fix mis-applied iommu identity check (bsc#1116924).\n- arm: imx: update the cpu power up timing setting on i.mx6sx (bnc#1012382).\n- arm: iop32x/n2100: fix PCI IRQ mapping (bnc#1012382).\n- arm: kvm: fix building with gcc-8 (bsc#1121241).\n- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bnc#1012382).\n- arm: OMAP2+: hwmod: Fix some section annotations (bnc#1012382).\n- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bnc#1012382).\n- arm: pxa: avoid section mismatch warning (bnc#1012382).\n- asix: Check for supported Wake-on-LAN modes (bnc#1012382).\n- ASoC: ak4613: Enable cache usage to fix crashes on resume (bnc#1012382).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bnc#1012382).\n- ASoC: dapm: Recalculate audio map forcely when card instantiated (bnc#1012382).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bnc#1012382).\n- ASoC: Intel: mrfld: fix uninitialized variable access (bnc#1012382).\n- ASoC: omap-dmic: Add pm_qos handling to avoid overruns with CPU_IDLE (bnc#1012382).\n- ASoC: omap-mcpdm: Add pm_qos handling to avoid under/overruns with CPU_IDLE (bnc#1012382).\n- ASoC: spear: fix error return code in spdif_in_probe() (bnc#1012382).\n- ASoC: wm8940: Enable cache usage to fix crashes on resume (bnc#1012382).\n- ata: Fix racy link clearance (bsc#1107866).\n- ataflop: fix error handling during setup (bnc#1012382).\n- ath10k: fix kernel panic due to race in accessing arvif list (bnc#1012382).\n- ath10k: schedule hardware restart if WMI command times out (bnc#1012382).\n- ax25: fix a use-after-free in ax25_fillin_cb() (bnc#1012382).\n- ax88179_178a: Check for supported Wake-on-LAN modes (bnc#1012382).\n- b43: Fix error in cordic routine (bnc#1012382).\n- batman-adv: Avoid WARN on net_device without parent in netns (bnc#1012382).\n- batman-adv: Expand merged fragment buffer for full packet (bnc#1012382).\n- batman-adv: Force mac header to start of data on xmit (bnc#1012382).\n- bcache: fix miss key refill-\u003eend in writeback (bnc#1012382).\n- bfs: add sanity check at bfs_fill_super() (bnc#1012382).\n- binfmt_elf: fix calculations for bss padding (bnc#1012382).\n- bitops: protect variables in bit_clear_unless() macro (bsc#1116285).\n- block: fix inheriting request priority from bio (bsc#1116924).\n- block/loop: Use global lock for ioctl() operation (bnc#1012382).\n- block: respect virtual boundary mask in bvecs (bsc#1113412).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (Git-fixes).\n- Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth (bnc#1012382).\n- Bluetooth: Fix unnecessary error message for HCI request completion (bnc#1012382).\n- Bluetooth: SMP: fix crash in unpairing (bnc#1012382).\n- bna: ethtool: Avoid reading past end of buffer (bnc#1012382).\n- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bnc#1012382).\n- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).\n- bonding: fix 802.3ad state sent to partner when unbinding slave (bnc#1012382).\n- bpf: fix check of allowed specifiers in bpf_trace_printk (bnc#1012382).\n- bpf: generally move prog destruction to RCU deferral (bnc#1012382).\n- bpf: support 8-byte metafield access (bnc#1012382).\n- bpf, trace: check event type in bpf_perf_event_read (bsc#1119970).\n- bpf, trace: use READ_ONCE for retrieving file ptr (bsc#1119967).\n- bpf/verifier: Add spi variable to check_stack_write() (bnc#1012382).\n- bpf/verifier: Pass instruction index to check_mem_access() and check_xadd() (bnc#1012382).\n- bridge: do not add port to router list when receives query with source 0.0.0.0 (bnc#1012382).\n- btrfs: Always try all copies when reading extent buffers (bnc#1012382).\n- btrfs: do not attempt to trim devices that do not support it (bnc#1012382).\n- btrfs: ensure path name is null terminated at btrfs_control_ioctl (bnc#1012382).\n- btrfs: fix backport error in submit_stripe_bio (bsc#1114763).\n- btrfs: fix data corruption due to cloning of eof block (bnc#1012382).\n- btrfs: Fix memory barriers usage with device stats counters (git-fixes).\n- btrfs: fix null pointer dereference on compressed write path error (bnc#1012382).\n- btrfs: fix pinned underflow after transaction aborted (bnc#1012382).\n- btrfs: fix use-after-free when dumping free space (bnc#1012382).\n- btrfs: fix wrong dentries after fsync of file that got its parent replaced (bnc#1012382).\n- btrfs: Handle error from btrfs_uuid_tree_rem call in _btrfs_ioctl_set_received_subvol (git-fixes).\n- btrfs: Handle owner mismatch gracefully when walking up tree (bnc#1012382).\n- btrfs: iterate all devices during trim, instead of fs_devices::alloc_list (bnc#1012382).\n- btrfs: locking: Add extra check in btrfs_init_new_buffer() to avoid deadlock (bnc#1012382).\n- btrfs: make sure we create all new block groups (bnc#1012382).\n- btrfs: qgroup: Dirty all qgroups before rescan (bnc#1012382).\n- btrfs: release metadata before running delayed refs (bnc#1012382).\n- btrfs: reset max_extent_size on clear in a bitmap (bnc#1012382).\n- btrfs: send, fix infinite loop due to directory rename dependencies (bnc#1012382).\n- btrfs: set max_extent_size properly (bnc#1012382).\n- btrfs: tree-checker: Check level for leaves and nodes (bnc#1012382).\n- btrfs: tree-checker: Do not check max block group size as current max chunk size limit is unreliable (fixes for bnc#1012382 bsc#1102875 bsc#1102877 bsc#1102879 bsc#1102882 bsc#1102896).\n- btrfs: tree-checker: Fix misleading group system information (bnc#1012382).\n- btrfs: tree-check: reduce stack consumption in check_dir_item (bnc#1012382).\n- btrfs: validate type when reading a chunk (bnc#1012382).\n- btrfs: wait on caching when putting the bg cache (bnc#1012382).\n- btrfs: wait on ordered extents on abort cleanup (bnc#1012382).\n- cachefiles: fix the race between cachefiles_bury_object() and rmdir(2) (bnc#1012382).\n- can: bcm: check timer values before ktime conversion (bnc#1012382).\n- can: dev: __can_get_echo_skb(): Do not crash the kernel if can_priv::echo_skb is accessed out of bounds (bnc#1012382).\n- can: dev: can_get_echo_skb(): factor out non sending code to __can_get_echo_skb() (bnc#1012382).\n- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bnc#1012382).\n- can: dev: __can_get_echo_skb(): print error message, if trying to echo non existing skb (bnc#1012382).\n- can: dev: __can_get_echo_skb(): replace struct can_frame by canfd_frame to access frame length (bnc#1012382).\n- can: gw: ensure DLC boundaries after CAN frame modification (bnc#1012382).\n- can: rcar_can: Fix erroneous registration (bnc#1012382).\n- cdc-acm: correct counting of UART states in serial state notification (bnc#1012382).\n- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bnc#1012382).\n- ceph: call setattr_prepare from ceph_setattr instead of inode_change_ok (bsc#1114763).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125809).\n- ceph: do not update importing cap\u0027s mseq when handing cap export (bsc#1121275).\n- ceph: fix dentry leak in ceph_readdir_prepopulate (bsc#1114839).\n- ceph: quota: fix null pointer dereference in quota check (bsc#1114839).\n- cfg80211: reg: Init wiphy_idx in regulatory_hint_core() (bnc#1012382).\n- char/mwave: fix potential Spectre v1 vulnerability (bnc#1012382).\n- checkstack.pl: fix for aarch64 (bnc#1012382).\n- cifs: Always resolve hostname before reconnecting (bnc#1012382).\n- cifs: check ntwrk_buf_start for NULL before dereferencing it (bnc#1012382).\n- cifs: Do not count -ENODATA as failure for query directory (bnc#1012382).\n- cifs: Do not hide EINTR after sending network packets (bnc#1012382).\n- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bnc#1012382).\n- cifs: Fix possible hang during async MTU reads and writes (bnc#1012382).\n- cifs: Fix potential OOB access of lock element array (bnc#1012382).\n- cifs: Fix separator when building path from dentry (bnc#1012382).\n- cifs: handle guest access errors to Windows shares (bnc#1012382).\n- cifs: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs) (bnc#1012382).\n- cifs: Limit memory used by lock request calls to a page (bnc#1012382).\n- clk: imx6q: reset exclusive gates on init (bnc#1012382).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bnc#1012382).\n- clk: mmp: Off by one in mmp_clk_add() (bnc#1012382).\n- clk: s2mps11: Add used attribute to s2mps11_dt_match (git-fixes).\n- clk: s2mps11: Fix matching when built as module and DT node contains compatible (bnc#1012382).\n- clk: samsung: exynos5420: Enable PERIS clocks for suspend (bnc#1012382).\n- clockevents/drivers/i8253: Add support for PIT shutdown quirk (bnc#1012382).\n- configfs: replace strncpy with memcpy (bnc#1012382).\n- cpufeature: avoid warning when compiling with clang (Git-fixes).\n- cpufreq: imx6q: add return value check for voltage scale (bnc#1012382).\n- cpufreq: intel_pstate: Fix HWP on boot CPU after system resume (bsc#1120017).\n- cpuidle: big.LITTLE: fix refcount leak (bnc#1012382).\n- cpuidle: Do not access cpuidle_devices when !CONFIG_CPU_IDLE (bnc#1012382).\n- cramfs: fix abad comparison when wrap-arounds occur (bnc#1012382).\n- crypto: arm64/sha - avoid non-standard inline asm tricks (bnc#1012382).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bnc#1012382).\n- crypto: authenc - fix parsing key with misaligned rta_len (bnc#1012382).\n- crypto: cts - fix crash on short inputs (bnc#1012382).\n- crypto: lrw - Fix out-of bounds access on counter overflow (bnc#1012382).\n- crypto: shash - Fix a sleep-in-atomic bug in shash_setkey_unaligned (bnc#1012382).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bnc#1012382).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bnc#1012382).\n- crypto, x86: aesni - fix token pasting for clang (bnc#1012382).\n- crypto: x86/chacha20 - avoid sleeping with preemption disabled (bnc#1012382).\n- cw1200: Do not leak memory if krealloc failes (bnc#1012382).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bnc#1012382).\n- cxgb4: Add support for new flash parts (bsc#1102439).\n- cxgb4: assume flash part size to be 4MB, if it can\u0027t be determined (bsc#1102439).\n- cxgb4: Fix FW flash errors (bsc#1102439).\n- cxgb4: fix missing break in switch and indent return statements (bsc#1102439).\n- cxgb4: support new ISSI flash parts (bsc#1102439).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bnc#1012382).\n- debugfs: fix debugfs_rename parameter checking (bnc#1012382).\n- debugobjects: avoid recursive calls with kmemleak (bnc#1012382).\n- disable stringop truncation warnings for now (bnc#1012382).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bnc#1012382).\n- dlm: fixed memory leaks after failed ls_remove_names allocation (bnc#1012382).\n- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bnc#1012382).\n- dlm: memory leaks on error path in dlm_user_request() (bnc#1012382).\n- dlm: possible memory leak on error path in create_lkb() (bnc#1012382).\n- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bnc#1012382).\n- dmaengine: at_hdmac: fix module unloading (bnc#1012382).\n- dmaengine: dma-jz4780: Return error if not probed from DT (bnc#1012382).\n- dmaengine: imx-dma: fix wrong callback invoke (bnc#1012382).\n- dm cache metadata: ignore hints array being too small during resize (Git-fixes).\n- dm crypt: add cryptographic data integrity protection (authenticated encryption) (Git-fixes).\n- dm crypt: factor IV constructor out to separate function (Git-fixes).\n- dm crypt: fix crash by adding missing check for auth key size (git-fixes).\n- dm crypt: fix error return code in crypt_ctr() (git-fixes).\n- dm crypt: fix memory leak in crypt_ctr_cipher_old() (git-fixes).\n- dm crypt: introduce new format of cipher with \u0027capi:\u0027 prefix (Git-fixes).\n- dm crypt: wipe kernel key copy after IV initialization (Git-fixes).\n- dm: do not allow readahead to limit IO size (git fixes (readahead)).\n- dm ioctl: harden copy_params()\u0027s copy_from_user() from malicious users (bnc#1012382).\n- dm kcopyd: Fix bug causing workqueue stalls (bnc#1012382).\n- dm-multipath: do not assign cmd_flags in setup_clone() (bsc#1103156).\n- dm raid: stop using BUG() in __rdev_sectors() (bsc#1046264).\n- dm snapshot: Fix excessive memory usage and workqueue stalls (bnc#1012382).\n- dm thin: fix bug where bio that overwrites thin block ignores FUA (bnc#1012382).\n- dm thin: stop no_space_timeout worker when switching to write-mode (Git-fixes).\n- Documentation/network: reword kernel version reference (bnc#1012382).\n- dpaa_eth: fix dpaa_get_stats64 to match prototype (bsc#1114763).\n- drbd: Avoid Clang warning about pointless switch statment (bnc#1012382).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bnc#1012382).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bnc#1012382).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bnc#1012382).\n- driver/dma/ioat: Call del_timer_sync() without holding prep_lock (bnc#1012382).\n- drivers: core: Remove glue dirs from sysfs earlier (bnc#1012382).\n- drivers: hv: vmbus: check the creation_status in vmbus_establish_gpadl() (bsc#1104098).\n- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bnc#1012382).\n- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bnc#1012382).\n- drivers/sbus/char: add of_node_put() (bnc#1012382).\n- drivers/tty: add missing of_node_put() (bnc#1012382).\n- drm/ast: change resolution may cause screen blurred (bnc#1012382).\n- drm/ast: fixed cursor may disappear sometimes (bnc#1012382).\n- drm/ast: fixed reading monitor EDID not stable issue (bnc#1012382).\n- drm/ast: Fix incorrect free on ioregs (bsc#1106929)\n- drm/ast: Remove existing framebuffers before loading driver (boo#1112963)\n- drm/bufs: Fix Spectre v1 vulnerability (bnc#1012382).\n- drm/dp_mst: Check if primary mstb is null (bnc#1012382).\n- drm/fb-helper: Ignore the value of fb_var_screeninfo.pixclock (bsc#1106929)\n- drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113766)\n- drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113766)\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1106929)\n- drm/i915/hdmi: Add HDMI 2.0 audio clock recovery N values (bnc#1012382).\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1106929)\n- drm/ioctl: Fix Spectre v1 vulnerabilities (bnc#1012382).\n- drm/modes: Prevent division by zero htotal (bnc#1012382).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bnc#1012382).\n- drm/nouveau/fbcon: fix oops without fbdev emulation (bnc#1012382).\n- drm/omap: fix memory barrier bug in DMM driver (bnc#1012382).\n- drm: rcar-du: Fix external clock error checks (bsc#1106929)\n- drm: rcar-du: Fix vblank initialization (bsc#1106929)\n- drm/rockchip: Allow driver to be shutdown on reboot/kexec (bnc#1012382).\n- drm/vmwgfx: Fix setting of dma masks (bsc#1106929)\n- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1106929)\n- e1000: avoid null pointer dereference on invalid stat type (bnc#1012382).\n- e1000e: allow non-monotonic SYSTIM readings (bnc#1012382).\n- e1000: fix race condition between e1000_down() and e1000_watchdog (bnc#1012382).\n- edac: Raise the maximum number of memory controllers (bsc#1120722).\n- efi/libstub/arm64: Force \u0027hidden\u0027 visibility for section markers (bnc#1012382).\n- efi/libstub/arm64: Set -fpie when building the EFI stub (bnc#1012382).\n- efi/libstub/arm64: Use hidden attribute for struct screen_info reference (bsc#1122650).\n- enic: fix checksum validation for IPv6 (bnc#1012382).\n- exec: avoid gcc-8 warning for get_task_comm (bnc#1012382).\n- exec: load_script: do not blindly truncate shebang string (bnc#1012382).\n- exportfs: do not read dentry after free (bnc#1012382).\n- ext2: fix potential use after free (bnc#1012382).\n- ext4: add missing brelse() add_new_gdb_meta_bg()\u0027s error path (bnc#1012382).\n- ext4: add missing brelse() in set_flexbg_block_bitmap()\u0027s error path (bnc#1012382).\n- ext4: add missing brelse() update_backups()\u0027s error path (bnc#1012382).\n- ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bnc#1012382).\n- ext4: avoid possible double brelse() in add_new_gdb() on error path (bnc#1012382).\n- ext4: avoid potential extra brelse in setup_new_flex_group_blocks() (bnc#1012382).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bnc#1012382).\n- ext4: fix argument checking in EXT4_IOC_MOVE_EXT (bnc#1012382).\n- ext4: fix buffer leak in __ext4_read_dirblock() on error path (bnc#1012382).\n- ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bnc#1012382).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- ext4: fix EXT4_IOC_GROUP_ADD ioctl (bnc#1012382).\n- ext4: fix missing cleanup if ext4_alloc_flex_bg_array() fails while resizing (bnc#1012382).\n- ext4: fix possible inode leak in the retry loop of ext4_resize_fs() (bnc#1012382).\n- ext4: fix possible leak of sbi-\u003es_group_desc_leak in error path (bnc#1012382).\n- ext4: fix possible use after free in ext4_quota_enable (bnc#1012382).\n- ext4: force inode writes when nfsd calls commit_metadata() (bnc#1012382).\n- ext4: initialize retries variable in ext4_da_write_inline_data_begin() (bnc#1012382).\n- ext4: missing unlock/put_page() in ext4_try_to_write_inline_data() (bnc#1012382).\n- ext4: release bs.bh before re-using in ext4_xattr_block_find() (bnc#1012382).\n- f2fs: Add sanity_check_inode() function (bnc#1012382).\n- f2fs: avoid unneeded loop in build_sit_entries (bnc#1012382).\n- f2fs: check blkaddr more accuratly before issue a bio (bnc#1012382).\n- f2fs: clean up argument of recover_data (bnc#1012382).\n- f2fs: clean up with is_valid_blkaddr() (bnc#1012382).\n- f2fs: detect wrong layout (bnc#1012382).\n- f2fs: enhance sanity_check_raw_super() to avoid potential overflow (bnc#1012382).\n- f2fs: factor out fsync inode entry operations (bnc#1012382).\n- f2fs: fix inode cache leak (bnc#1012382).\n- f2fs: fix invalid memory access (bnc#1012382).\n- f2fs: fix missing up_read (bnc#1012382).\n- f2fs: fix to avoid reading out encrypted data in page cache (bnc#1012382).\n- f2fs: fix to convert inline directory correctly (bnc#1012382).\n- f2fs: fix to determine start_cp_addr by sbi-\u003ecur_cp_pack (bnc#1012382).\n- f2fs: fix to do sanity check with block address in main area (bnc#1012382).\n- f2fs: fix to do sanity check with block address in main area v2 (bnc#1012382).\n- f2fs: fix to do sanity check with cp_pack_start_sum (bnc#1012382).\n- f2fs: fix to do sanity check with node footer and iblocks (bnc#1012382).\n- f2fs: fix to do sanity check with reserved blkaddr of inline inode (bnc#1012382).\n- f2fs: fix to do sanity check with secs_per_zone (bnc#1012382).\n- f2fs: fix to do sanity check with user_block_count (bnc#1012382).\n- f2fs: fix validation of the block count in sanity_check_raw_super (bnc#1012382).\n- f2fs: fix wrong return value of f2fs_acl_create (bnc#1012382).\n- f2fs: free meta pages if sanity check for ckpt is failed (bnc#1012382).\n- f2fs: give -EINVAL for norecovery and rw mount (bnc#1012382).\n- f2fs: introduce and spread verify_blkaddr (bnc#1012382).\n- f2fs: introduce get_checkpoint_version for cleanup (bnc#1012382).\n- f2fs: move dir data flush to write checkpoint process (bnc#1012382).\n- f2fs: move sanity checking of cp into get_valid_checkpoint (bnc#1012382).\n- f2fs: not allow to write illegal blkaddr (bnc#1012382).\n- f2fs: put directory inodes before checkpoint in roll-forward recovery (bnc#1012382).\n- f2fs: read page index before freeing (bnc#1012382).\n- f2fs: remove an obsolete variable (bnc#1012382).\n- f2fs: return error during fill_super (bnc#1012382).\n- f2fs: sanity check on sit entry (bnc#1012382).\n- f2fs: use crc and cp version to determine roll-forward recovery (bnc#1012382).\n- fbdev: fbcon: Fix unregister crash when more than one framebuffer (bsc#1106929)\n- fbdev: fbmem: behave better with small rotated displays and many CPUs (bsc#1106929)\n- fcoe: remove duplicate debugging message in fcoe_ctlr_vn_add (bsc#1114763).\n- Fix kabi for \u0027Ensure we commit after writeback is complete\u0027 (bsc#1111809).\n- Fix problem with sharetransport= and NFSv4 (bsc#1114893).\n- floppy: fix race condition in __floppy_read_block_0() (Git-fixes).\n- flow_dissector: do not dissect l4 ports for fragments (bnc#1012382).\n- fork: record start_time late (bnc#1012382).\n- fs: add the fsnotify call to vfs_iter_write (bnc#1012382).\n- fscache, cachefiles: remove redundant variable \u0027cache\u0027 (bnc#1012382).\n- fscache: fix race between enablement and dropping of object (bsc#1107385).\n- fscache: Fix race in fscache_op_complete() due to split atomic_sub \u0026 read (Git-fixes).\n- fscache: Pass the correct cancelled indications to fscache_op_complete() (Git-fixes).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (bnc#1012382).\n- fs: do not scan the inode cache before SB_BORN is set (bnc#1012382).\n- fs, elf: make sure to page align bss in load_elf_library (bnc#1012382).\n- fs/epoll: drop ovflist branch prediction (bnc#1012382).\n- fs/exofs: fix potential memory leak in mount option parsing (bnc#1012382).\n- fs/fat/fatent.c: add cond_resched() to fat_count_free_clusters() (bnc#1012382).\n- fs: fix lost error code in dio_complete (bsc#1117744).\n- fuse: call pipe_buf_release() under pipe lock (bnc#1012382).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bnc#1012382).\n- fuse: Dont call set_page_dirty_lock() for ITER_BVEC pages for async_dio (bnc#1012382).\n- fuse: fix blocked_waitq wakeup (bnc#1012382).\n- fuse: fix leaked notify reply (bnc#1012382).\n- fuse: Fix use-after-free in fuse_dev_do_read() (bnc#1012382).\n- fuse: Fix use-after-free in fuse_dev_do_write() (bnc#1012382).\n- fuse: handle zero sized retrieve correctly (bnc#1012382).\n- fuse: set FR_SENT while locked (bnc#1012382).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bnc#1012382).\n- genirq: Fix race on spurious interrupt detection (bnc#1012382).\n- genwqe: Fix size check (bnc#1012382).\n- gfs2: Do not leave s_fs_info pointing to freed memory in init_sbd (bnc#1012382).\n- gfs2: Fix loop in gfs2_rbm_find (bnc#1012382).\n- gfs2_meta: -\u003emount() can get NULL dev_name (bnc#1012382).\n- gfs2: Put bitmap buffers in put_super (bnc#1012382).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bnc#1012382).\n- git_sort.py: Remove non-existent remote tj/libata\n- gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB (Git-fixes).\n- gpio: max7301: fix driver for use with CONFIG_VMAP_STACK (bnc#1012382).\n- gpio: msic: fix error return code in platform_msic_gpio_probe() (bnc#1012382).\n- gpio: pl061: handle failed allocations (bnc#1012382).\n- gpu: host1x: fix error return code in host1x_probe() (bnc#1012382).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1106929)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1106929)\n- gro_cell: add napi_disable in gro_cells_destroy (bnc#1012382).\n- hfs: do not free node before using (bnc#1012382).\n- hfsplus: do not free node before using (bnc#1012382).\n- hfsplus: prevent btree data loss on root split (bnc#1012382).\n- hfs: prevent btree data loss on root split (bnc#1012382).\n- hid: debug: fix the ring buffer implementation (bnc#1012382).\n- hid: hiddev: fix potential Spectre v1 (bnc#1012382).\n- hid: lenovo: Add checks to fix of_led_classdev_register (bnc#1012382).\n- hid: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges (bnc#1012382).\n- hpwdt add dynamic debugging (bsc#1114417).\n- hpwdt calculate reload value on each use (bsc#1114417).\n- hugetlbfs: dirty pages as they are added to pagecache (bnc#1012382).\n- hugetlbfs: fix bug in pgoff overflow checking (bnc#1012382).\n- hugetlbfs: fix kernel BUG at fs/hugetlbfs/inode.c:444! (bnc#1012382).\n- hwmon: (ibmpowernv) Remove bogus __init annotations (bnc#1012382).\n- hwmon: (ina2xx) Fix current value calculation (bnc#1012382).\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bnc#1012382).\n- hwmon: (lm80) fix a missing check of the status of SMBus read (bnc#1012382).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (git-fixes).\n- hwmon: (pmbus) Fix page count auto-detection (bnc#1012382).\n- hwmon: (w83795) temp4_type has writable permission (bnc#1012382).\n- hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).\n- i2c-axxia: check for error conditions first (bnc#1012382).\n- i2c: axxia: properly handle master timeout (bnc#1012382).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bnc#1012382).\n- i2c: scmi: Fix probe error on devices with an empty SMB0001 ACPI device node (bnc#1012382).\n- IB/core: type promotion bug in rdma_rw_init_one_mr() ().\n- IB/hfi1: Fix an out-of-bounds access in get_hw_stats ().\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (bnc#1012382).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Convert reset work item mutex to spin lock ().\n- ibmvnic: fix accelerated VLAN handling ().\n- ibmvnic: fix index in release_rx_pools (bsc#1115440).\n- ibmvnic: Fix non-atomic memory allocation in IRQ context ().\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- ibmvnic: remove ndo_poll_controller ().\n- ibmvnic: Update driver queues after change in ring size support ().\n- ib/rxe: Fix incorrect cache cleanup in error flow ().\n- ib/rxe: replace kvfree with vfree ().\n- ib/ucm: Fix Spectre v1 vulnerability (bnc#1012382).\n- ide: pmac: add of_node_put() (bnc#1012382).\n- ieee802154: lowpan_header_create check must check daddr (bnc#1012382).\n- igb: Fix an issue that PME is not enabled during runtime suspend (bnc#1012382).\n- igb: Remove superfluous reset to PHY and page 0 selection (bnc#1012382).\n- iio: adc: at91: fix acking DRDY irq on simple conversions (bnc#1012382).\n- iio: adc: at91: fix wrong channel number in triggered buffer mode (bnc#1012382).\n- ima: fix showing large \u0027violations\u0027 or \u0027runtime_measurements_count\u0027 (bnc#1012382).\n- inet: frags: add a pointer to struct netns_frags (bnc#1012382).\n- inet: frags: better deal with smp races (bnc#1012382).\n- inet: frags: break the 2GB limit for frags storage (bnc#1012382).\n- inet: frags: change inet_frags_init_net() return value (bnc#1012382).\n- inet: frags: do not clone skb in ip_expire() (bnc#1012382).\n- inet: frags: fix ip6frag_low_thresh boundary (bnc#1012382).\n- inet: frags: get rid of ipfrag_skb_cb/FRAG_CB (bnc#1012382).\n- inet: frags: get rif of inet_frag_evicting() (bnc#1012382).\n- inet: frags: refactor ipfrag_init() (bnc#1012382).\n- inet: frags: refactor ipv6_frag_init() (bnc#1012382).\n- inet: frags: refactor lowpan_net_frag_init() (bnc#1012382).\n- inet: frags: remove inet_frag_maybe_warn_overflow() (bnc#1012382).\n- inet: frags: remove some helpers (bnc#1012382).\n- inet: frags: reorganize struct netns_frags (bnc#1012382).\n- inet: frags: use rhashtables for reassembly units (bnc#1012382).\n- Input: bma150 - register input device after setting private data (bnc#1012382).\n- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15ARR (bnc#1012382).\n- Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM (bnc#1012382).\n- Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bnc#1012382).\n- Input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bnc#1012382).\n- Input: elan_i2c - add ELAN0620 to the ACPI table (bnc#1012382).\n- Input: elan_i2c - add support for ELAN0621 touchpad (bnc#1012382).\n- Input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bnc#1012382).\n- Input: matrix_keypad - check for errors from of_get_named_gpio() (bnc#1012382).\n- Input: omap-keypad - fix idle configuration to not block SoC idle states (bnc#1012382).\n- Input: omap-keypad - fix keyboard debounce configuration (bnc#1012382).\n- Input: restore EV_ABS ABS_RESERVED (bnc#1012382).\n- Input: xpad - add GPD Win 2 Controller USB IDs (bnc#1012382).\n- Input: xpad - add Mad Catz FightStick TE 2 VID/PID (bnc#1012382).\n- Input: xpad - add more third-party controllers (bnc#1012382).\n- Input: xpad - add PDP device id 0x02a4 (bnc#1012382).\n- Input: xpad - add product ID for Xbox One S pad (bnc#1012382).\n- Input: xpad - add support for PDP Xbox One controllers (bnc#1012382).\n- Input: xpad - add support for SteelSeries Stratus Duo (bnc#1012382).\n- Input: xpad - add support for Xbox1 PDP Camo series gamepad (bnc#1012382).\n- Input: xpad - add USB IDs for Mad Catz Brawlstick and Razer Sabertooth (bnc#1012382).\n- Input: xpad - avoid using __set_bit() for capabilities (bnc#1012382).\n- Input: xpad - constify usb_device_id (bnc#1012382).\n- Input: xpad - correctly sort vendor id\u0027s (bnc#1012382).\n- Input: xpad - correct xbox one pad device name (bnc#1012382).\n- Input: xpad - do not depend on endpoint order (bnc#1012382).\n- Input: xpad - fix GPD Win 2 controller name (bnc#1012382).\n- Input: xpad - fix PowerA init quirk for some gamepad models (bnc#1012382).\n- Input: xpad - fix rumble on Xbox One controllers with 2015 firmware (bnc#1012382).\n- Input: xpad - fix some coding style issues (bnc#1012382).\n- Input: xpad - fix stuck mode button on Xbox One S pad (bnc#1012382).\n- Input: xpad - fix Xbox One rumble stopping after 2.5 secs (bnc#1012382).\n- Input: xpad - handle \u0027present\u0027 and \u0027gone\u0027 correctly (bnc#1012382).\n- Input: xpad - move reporting xbox one home button to common function (bnc#1012382).\n- Input: xpad - power off wireless 360 controllers on suspend (bnc#1012382).\n- Input: xpad - prevent spurious input from wired Xbox 360 controllers (bnc#1012382).\n- Input: xpad - quirk all PDP Xbox One gamepads (bnc#1012382).\n- Input: xpad - remove spurious events of wireless xpad 360 controller (bnc#1012382).\n- Input: xpad - remove unused function (bnc#1012382).\n- Input: xpad - restore LED state after device resume (bnc#1012382).\n- Input: xpad - simplify error condition in init_output (bnc#1012382).\n- Input: xpad - sort supported devices by USB ID (bnc#1012382).\n- Input: xpad - support some quirky Xbox One pads (bnc#1012382).\n- Input: xpad - sync supported devices with 360Controller (bnc#1012382).\n- Input: xpad - sync supported devices with XBCD (bnc#1012382).\n- Input: xpad - sync supported devices with xboxdrv (bnc#1012382).\n- Input: xpad - update Xbox One Force Feedback Support (bnc#1012382).\n- Input: xpad - use LED API when identifying wireless controllers (bnc#1012382).\n- Input: xpad - validate USB endpoint type during probe (bnc#1012382).\n- Input: xpad - workaround dead irq_out after suspend/ resume (bnc#1012382).\n- Input: xpad - xbox one elite controller support (bnc#1012382).\n- intel_pstate: Update frequencies of policy-\u003ecpus only from -\u003eset_policy() (bsc#1120017).\n- intel_th: msu: Fix an off-by-one in attribute store (bnc#1012382).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix amd_iommu=force_isolation (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/arm-smmu: Ensure that page-table updates are visible before TLBI (bsc#1106237).\n- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bnc#1012382).\n- iommu/ipmmu-vmsa: Fix crash on early domain free (bsc#1106105).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer dereference in prq_event_thread() (bsc#1106105).\n- iommu/vt-d: Handle domain agaw being less than iommu agaw (bsc#1106105).\n- iommu/vt-d: Use memunmap to free memremap (bsc#1106105).\n- ip6mr: Fix potential Spectre v1 vulnerability (bnc#1012382).\n- ip: add helpers to process in-order fragments faster (bnc#1012382).\n- ipfrag: really prevent allocation on netns exit (bnc#1012382).\n- ip: frags: fix crash in ip_do_fragment() (bnc#1012382).\n- ipmi: Fix timer race with module unload (bnc#1012382).\n- ipmi:ssif: Fix handling of multi-part return messages (bnc#1012382).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (bnc#1012382).\n- ip: process in-order fragments efficiently (bnc#1012382).\n- ip_tunnel: do not force DF when MTU is locked (bnc#1012382).\n- ip_tunnel: Fix name string concatenate in __ip_tunnel_create() (bnc#1012382).\n- ip: use rb trees for IP frag queue (bnc#1012382).\n- ipv4: Fix potential Spectre v1 vulnerability (bnc#1012382).\n- ipv4: frags: precedence bug in ip_expire() (bnc#1012382).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (bsc#1110286).\n- ipv6: Check available headroom in ip6_xmit() even without options (bnc#1012382).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (bnc#1012382).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (bnc#1012382).\n- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (bnc#1012382).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (bnc#1012382).\n- ipv6: Fix PMTU updates for UDP/raw sockets in presence of VRF (bnc#1012382).\n- ipv6: frags: rewrite ip6_expire_frag_queue() (bnc#1012382).\n- ipv6: mcast: fix a use-after-free in inet6_mc_check (bnc#1012382).\n- ipv6/ndisc: Preserve IPv6 control buffer if protocol error handlers are called (bnc#1012382).\n- ipv6: orphan skbs in reassembly unit (bnc#1012382).\n- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).\n- ipv6: suppress sparse warnings in IP6_ECN_set_ce() (bnc#1012382).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (bnc#1012382).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bnc#1012382).\n- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bnc#1012382).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bnc#1012382).\n- iser: set sector for ambiguous mr status errors (bnc#1012382).\n- iwlwifi: mvm: fix regulatory domain update when the firmware starts (bnc#1012382).\n- iwlwifi: mvm: support sta_statistics() even on older firmware (bnc#1012382).\n- ixgbe: Add function for checking to see if we can reuse page (bsc#1100105).\n- ixgbe: Add support for build_skb (bsc#1100105).\n- ixgbe: Add support for padding packet (bsc#1100105).\n- ixgbe: Break out Rx buffer page management (bsc#1100105).\n- ixgbe: Fix output from ixgbe_dump (bsc#1100105).\n- ixgbe: fix possible race in reset subtask (bsc#1101557).\n- ixgbe: Make use of order 1 pages and 3K buffers independent of FCoE (bsc#1100105).\n- ixgbe: Only DMA sync frame length (bsc#1100105).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bnc#1012382).\n- ixgbe: Refactor queue disable logic to take completion time into account (bsc#1101557).\n- ixgbe: Reorder Tx/Rx shutdown to reduce time needed to stop device (bsc#1101557).\n- ixgbe: Update code to better handle incrementing page count (bsc#1100105).\n- ixgbe: Update driver to make use of DMA attributes in Rx path (bsc#1100105).\n- ixgbe: Use length to determine if descriptor is done (bsc#1100105).\n- jbd2: fix use after free in jbd2_log_do_checkpoint() (bnc#1012382).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bnc#1012382).\n- jffs2: free jffs2_sb_info through jffs2_kill_sb() (bnc#1012382).\n- kabi: hwpoison, memory_hotplug: allow hwpoisoned pages to be offlined (bnc#1116336).\n- kabi: protect get_vaddr_frames (kabi).\n- kabi: protect linux/kfifo.h include in hid-debug (kabi).\n- kabi: protect struct azx (kabi).\n- kabi: protect struct cfs_bandwidth (kabi).\n- kabi: protect struct esp (kabi).\n- kabi: protect struct fuse_io_priv (kabi).\n- kabi: protect struct hda_bus (kabi).\n- kabi: protect __usb_get_extra_descriptor (kabi).\n- kabi: protect xen/xen-ops.h include in xlate_mmu.c (kabi).\n- kabi: reorder new slabinfo fields in struct kmem_cache_node (bnc#1116653).\n- kabi: revert sig change on pnfs_read_resend_pnfs (git-fixes).\n- kaweth: use skb_cow_head() to deal with cloned skbs (bnc#1012382).\n- kbuild: Add better clang cross build support (bnc#1012382).\n- kbuild: Add __cc-option macro (bnc#1012382).\n- kbuild: Add support to generate LLVM assembly files (bnc#1012382).\n- kbuild: allow to use GCC toolchain not in Clang search path (bnc#1012382).\n- kbuild: clang: add -no-integrated-as to KBUILD_[AC]FLAGS (bnc#1012382).\n- kbuild: clang: Disable \u0027address-of-packed-member\u0027 warning (bnc#1012382).\n- kbuild: clang: disable unused variable warnings only when constant (bnc#1012382).\n- kbuild: clang: fix build failures with sparse check (bnc#1012382).\n- kbuild: clang: remove crufty HOSTCFLAGS (bnc#1012382).\n- kbuild: Consolidate header generation from ASM offset information (bnc#1012382).\n- kbuild: consolidate redundant sed script ASM offset generation (bnc#1012382).\n- kbuild: drop -Wno-unknown-warning-option from clang options (bnc#1012382).\n- kbuild: fix asm-offset generation to work with clang (bnc#1012382).\n- kbuild: fix kernel/bounds.c \u0027W=1\u0027 warning (bnc#1012382).\n- kbuild: fix linker feature test macros when cross compiling with Clang (bnc#1012382).\n- kbuild, LLVMLinux: Add -Werror to cc-option to support clang (bnc#1012382).\n- kbuild: move cc-option and cc-disable-warning after incl. arch Makefile (bnc#1012382).\n- kbuild: Set KBUILD_CFLAGS before incl. arch Makefile (bnc#1012382).\n- kbuild: set no-integrated-as before incl. arch Makefile (bnc#1012382).\n- kbuild: suppress packed-not-aligned warning for default setting only (bnc#1012382).\n- kbuild: use -Oz instead of -Os when using clang (bnc#1012382).\n- kconfig: fix file name and line number of warn_ignored_character() (bnc#1012382).\n- kconfig: fix memory leak when EOF is encountered in quotation (bnc#1012382).\n- kdb: use memmove instead of overlapping memcpy (bnc#1012382).\n- kdb: Use strscpy with destination buffer size (bnc#1012382).\n- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (bnc#1012382).\n- kernel/hung_task.c: break RCU locks based on jiffies (bnc#1012382).\n- kernel-source.spec: Align source numbering.\n- kernfs: Replace strncpy with memcpy (bnc#1012382).\n- keys: put keyring if install_session_keyring_to_cred() fails (bnc#1012382).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bnc#1012382).\n- kgdboc: Fix restrict error (bnc#1012382).\n- kgdboc: Fix warning with module build (bnc#1012382).\n- kgdboc: Passing ekgdboc to command line causes panic (bnc#1012382).\n- kobject: Replace strncpy with memcpy (bnc#1012382).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bnc#1012382).\n- kvm/arm64: Fix caching of host MDCR_EL2 value (bsc#1121242).\n- kvm/arm: Restore banked registers and physical timer access on hyp_panic() (bsc#1121240).\n- kvm/mmu: Fix race in emulated page table writes (bnc#1012382).\n- kvm/nvmx: Always reflect #NM VM-exits to L1 (bsc#1106240).\n- kvm/nvmx: Eliminate vmcs02 pool (bnc#1012382).\n- kvm/nvmx: mark vmcs12 pages dirty on L2 exit (bnc#1012382).\n- kvm/ppc: Move and undef TRACE_INCLUDE_PATH/FILE (bnc#1012382).\n- kvm/svm: Allow direct access to MSR_IA32_SPEC_CTRL (bnc#1012382 bsc#1068032).\n- kvm/svm: Ensure an IBPB on all affected CPUs when freeing a vmcb (bsc#1114648).\n- kvm/vmx: Allow direct access to MSR_IA32_SPEC_CTRL (bnc#1012382 bsc#1068032 bsc#1096242 bsc#1096281).\n- kvm/vmx: Emulate MSR_IA32_ARCH_CAPABILITIES (bnc#1012382).\n- kvm/vmx: Fix x2apic check in vmx_msr_bitmap_mode() (bsc#1124166).\n- kvm/vmx: introduce alloc_loaded_vmcs (bnc#1012382).\n- kvm/vmx: make MSR bitmaps per-VCPU (bnc#1012382).\n- kvm/vmx: Missing part of upstream commit 904e14fb7cb9 (bsc#1124166).\n- kvm/x86: Add IBPB support (bnc#1012382 bsc#1068032 bsc#1068032).\n- kvm/x86: fix empty-body warnings (bnc#1012382).\n- kvm/x86: Fix single-step debugging (bnc#1012382).\n- kvm/x86: Remove indirect MSR op calls from SPEC_CTRL (bnc#1012382).\n- kvm/x86: svm: report MSR_IA32_MCG_EXT_CTL as unsupported (bnc#1012382).\n- kvm/x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bnc#1012382).\n- l2tp: copy 4 more bytes to linear part if necessary (bnc#1012382).\n- l2tp: fix reading optional fields of L2TPv3 (bnc#1012382).\n- l2tp: remove l2specific_len dependency in l2tp_core (bnc#1012382).\n- lan78xx: Check for supported Wake-on-LAN modes (bnc#1012382).\n- leds: call led_pwm_set() in leds-pwm to enforce default LED_OFF (bnc#1012382).\n- leds: leds-gpio: Fix return value check in create_gpio_led() (bnc#1012382).\n- leds: turn off the LED and wait for completion on unregistering LED class device (bnc#1012382).\n- libata: whitelist all SAMSUNG MZ7KM* solid-state disks (bnc#1012382).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125810).\n- libceph: bump CEPH_MSG_MAX_DATA_LEN (bsc#1114839).\n- libceph: fall back to sendmsg for slab pages (bsc#1118316).\n- libfc: sync strings with upstream versions (bsc#1114763).\n- lib/interval_tree_test.c: allow full tree search (bnc#1012382).\n- lib/interval_tree_test.c: allow users to limit scope of endpoint (bnc#1012382).\n- lib/interval_tree_test.c: make test options module parameters (bnc#1012382).\n- libnvdimm, {btt, blk}: do integrity setup before add_disk() (bsc#1118926).\n- libnvdimm, dimm: fix dpa reservation vs uninitialized label area (bsc#1118936).\n- libnvdimm: fix ars_status output length calculation (bsc#1124777).\n- libnvdimm: fix integer overflow static analysis warning (bsc#1118922).\n- libnvdimm: fix nvdimm_bus_lock() vs device_lock() ordering (bsc#1118915).\n- libnvdimm: Hold reference on parent while scheduling async init (bnc#1012382).\n- libnvdimm, pfn: Pad pfn namespaces relative to other regions (bsc#1124811).\n- libnvdimm: Use max contiguous area for namespace size (bsc#1124780).\n- lib/raid6: Fix arm64 test build (bnc#1012382).\n- lib/rbtree_test.c: make input module parameters (bnc#1012382).\n- lib/rbtree-test: lower default params (bnc#1012382).\n- llc: do not use sk_eat_skb() (bnc#1012382).\n- lockd: fix access beyond unterminated strings in prints (bnc#1012382).\n- locking/lockdep: Fix debug_locks off performance problem (bnc#1012382).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: Fix double mutex_unlock(\u0026loop_ctl_mutex) in loop_control_ioctl() (bnc#1012382).\n- loop: Fold __loop_release into loop_release (bnc#1012382).\n- loop: Get rid of loop_index_mutex (bnc#1012382).\n- lsm: Check for NULL cred-security on free (bnc#1012382).\n- mac80211: Always report TX status (bnc#1012382).\n- mac80211: Clear beacon_int in ieee80211_do_stop (bnc#1012382).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bnc#1012382).\n- mac80211: fix radiotap vendor presence bitmap handling (bnc#1012382).\n- mac80211: fix reordering of buffered broadcast packets (bnc#1012382).\n- mac80211_hwsim: do not omit multicast announce of first added radio (bnc#1012382).\n- mac80211_hwsim: fix module init error paths for netlink (bnc#1012382).\n- mac80211_hwsim: Timer should be initialized before device registered (bnc#1012382).\n- mac80211: ignore NullFunc frames in the duplicate detection (bnc#1012382).\n- mac80211: ignore tx status for PS stations in ieee80211_tx_status_ext (bnc#1012382).\n- mach64: fix display corruption on big endian machines (bnc#1012382).\n- mach64: fix image corruption due to reading accelerator registers (bnc#1012382).\n- matroxfb: fix size of memcpy (bnc#1012382).\n- md: batch flush requests (bsc#1119680).\n- md: do not check MD_SB_CHANGE_CLEAN in md_allow_write (Git-fixes).\n- md: fix invalid stored role for a disk (bnc#1012382).\n- md: fix invalid stored role for a disk - try2 (bnc#1012382).\n- md: reorder flag_bits to match upstream commits\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bnc#1012382).\n- media: dvb-frontends: fix i2c access helpers for KASAN (bnc#1012382).\n- media: em28xx: fix input name for Terratec AV 350 (bnc#1012382).\n- media: em28xx: Fix misplaced reset of dev-\u003ev4l::field_count (bnc#1012382).\n- media: em28xx: Fix use-after-free when disconnecting (bnc#1012382).\n- media: em28xx: make v4l2-compliance happier by starting sequence on zero (bnc#1012382).\n- media: em28xx: use a default format if TRY_FMT fails (bnc#1012382).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bnc#1012382).\n- media: pci: cx23885: handle adding to list failure (bnc#1012382).\n- media: tvp5150: fix width alignment during set_selection() (bnc#1012382).\n- media: v4l: event: Add subscription to list before calling \u0027add\u0027 operation (bnc#1012382).\n- media: vb2: be sure to unlock mutex on errors (bnc#1012382).\n- media: vb2: vb2_mmap: move lock up (bnc#1012382).\n- media: vivid: fix error handling of kthread_run (bnc#1012382).\n- media: vivid: free bitmap_cap when updating std/timings/etc (bnc#1012382).\n- media: vivid: set min width/height to a value \u003e 0 (bnc#1012382).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bnc#1012382).\n- mfd: tps6586x: Handle interrupts on suspend (bnc#1012382).\n- mips: bpf: fix encoding bug for mm_srlv32_op (bnc#1012382).\n- mips: cm: reprime error cause (bnc#1012382).\n- mips: fix n32 compat_ipc_parse_version (bnc#1012382).\n- mips: OCTEON: do not set octeon_dma_bar_type if PCI is disabled (bnc#1012382).\n- mips: SiByte: Enable swiotlb for SWARM, LittleSur and BigSur (bnc#1012382).\n- mips: VDSO: Include $(ccflags-vdso) in o32,n32 .lds builds (bnc#1012382).\n- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bnc#1012382).\n- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bnc#1012382).\n- misc: vexpress: Off by one in vexpress_syscfg_exec() (bnc#1012382).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bnc#1012382).\n- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).\n- mmc: core: Reset HPI enabled state during re-init and in case of errors (bnc#1012382).\n- mm: cleancache: fix corruption on missed inode invalidation (bnc#1012382).\n- mmc: OMAP: fix broken MMC on OMAP15XX/OMAP5910/OMAP310 (bnc#1012382).\n- mmc: omap_hsmmc: fix DMA API warning (bnc#1012382).\n- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bnc#1012382).\n- mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01 (bnc#1012382).\n- mm, devm_memremap_pages: kill mapping \u0027System RAM\u0027 support (bnc#1012382).\n- mm: do not bug_on on incorrect length in __mm_populate() (bnc#1012382).\n- mm: do not miss the last page because of round-off error (bnc#1118798).\n- mm, elf: handle vm_brk error (bnc#1012382).\n- mm, hugetlb: fix huge_pte_alloc BUG_ON (bsc#1119204).\n- mm: hwpoison: call shake_page() after try_to_unmap() for mlocked page (bnc#1116336).\n- mm: lower the printk loglevel for __dump_page messages (generic hotplug debugability).\n- mm, memory_hotplug: be more verbose for memory offline failures (generic hotplug debugability).\n- mm, memory_hotplug: drop pointless block alignment checks from __offline_pages (generic hotplug debugability).\n- mm, memory_hotplug: print reason for the offlining failure (generic hotplug debugability).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (bnc#1012382).\n- mm: migration: fix migration of huge PMD shared pages (bnc#1012382).\n- mm: mlock: avoid increase mm-\u003elocked_vm on mlock() when already mlock2(,MLOCK_ONFAULT) (bnc#1012382).\n- mm/nommu.c: Switch __get_user_pages_unlocked() to use __get_user_pages() (bnc#1012382).\n- mm: only report isolation failures when offlining memory (generic hotplug debugability).\n- mm, oom: fix use-after-free in oom_kill_process (bnc#1012382).\n- mm, page_alloc: drop should_suppress_show_mem (bnc#1125892, bnc#1106061).\n- mm/page-writeback.c: do not break integrity writeback on -\u003ewritepage() error (bnc#1012382).\n- mm: Preserve _PAGE_DEVMAP across mprotect() calls (bsc#1118790).\n- mm: print more information about mapping in __dump_page (generic hotplug debugability).\n- mm, proc: be more verbose about unstable VMA flags in /proc/\u0026lt;pid\u003e/smaps (bnc#1012382).\n- mm: put_and_wait_on_page_locked() while page is migrated (bnc#1109272).\n- mm: refuse wrapped vm_brk requests (bnc#1012382).\n- mm: remove write/force parameters from __get_user_pages_locked() (bnc#1012382 bsc#1027260).\n- mm: remove write/force parameters from __get_user_pages_unlocked() (bnc#1012382 bsc#1027260).\n- mm: replace __access_remote_vm() write parameter with gup_flags (bnc#1012382).\n- mm: replace access_remote_vm() write parameter with gup_flags (bnc#1012382).\n- mm: replace get_user_pages_locked() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).\n- mm: replace get_user_pages_unlocked() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).\n- mm: replace get_user_pages() write/force parameters with gup_flags (bnc#1012382 bsc#1027260).\n- mm: replace get_vaddr_frames() write/force parameters with gup_flags (bnc#1012382).\n- mm, slab: faster active and free stats (bsc#1116653, VM Performance).\n- mm/slab: improve performance of gathering slabinfo stats (bsc#1116653, VM Performance).\n- mm, slab: maintain total slab count instead of active count (bsc#1116653, VM Performance).\n- mm: thp: relax __GFP_THISNODE for MADV_HUGEPAGE mappings (bnc#1012382).\n- modpost: validate symbol names also in find_elf_symbol (bnc#1012382).\n- modules: mark __inittest/__exittest as __maybe_unused (bnc#1012382).\n- mount: Do not allow copying MNT_UNBINDABLE|MNT_LOCKED mounts (bnc#1012382).\n- mount: Prevent MNT_DETACH from disconnecting locked mounts (bnc#1012382).\n- mount: Retest MNT_LOCKED in do_umount (bnc#1012382).\n- Move patches to sorted range, p1\n- Move /proc/sys/vm/procfs-drop-fd-dentries to /proc/sys/fs/procfs-drop-fd-dentries (bsc#1086652) This was incorrectly put in /proc/sys/vm.\n- msi: Disable MSI also when pcie-octeon.pcie_disable on (bnc#1012382).\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bnc#1012382).\n- mtd: rawnand: gpmi: fix MX28 bus master lockup problem (bnc#1012382).\n- mtd: spi-nor: Add support for is25wp series chips (bnc#1012382).\n- mv88e6060: disable hardware level MAC learning (bnc#1012382).\n- mwifiex: Fix NULL pointer dereference in skb_dequeue() (bnc#1012382).\n- mwifiex: fix p2p device does not find in scan problem (bnc#1012382).\n- namei: allow restricted O_CREAT of FIFOs and regular files (bnc#1012382).\n- neighbour: Avoid writing before skb-\u003ehead in neigh_hh_output() (bnc#1012382).\n- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (bnc#1012382).\n- net/af_iucv: drop inbound packets with invalid flags (bnc#1114475, LTC#172679).\n- net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1114475, LTC#172679).\n- net: amd: add missing of_node_put() (bnc#1012382).\n- net: bcmgenet: fix OF child-node lookup (bnc#1012382).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (bnc#1012382).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (bnc#1012382).\n- net: bridge: remove ipv6 zero address check in mcast queries (bnc#1012382).\n- net: call sk_dst_reset when set SO_DONTROUTE (bnc#1012382).\n- net: cxgb3_main: fix a missing-check bug (bnc#1012382).\n- net: dp83640: expire old TX-skb (bnc#1012382).\n- net: drop skb on failure in ip_check_defrag() (bnc#1012382).\n- net: drop write-only stack variable (bnc#1012382).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (bnc#1012382).\n- net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1117562).\n- net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1117562).\n- net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1117562).\n- net: ena: complete host info to match latest ENA spec (bsc#1117562).\n- net: ena: enable Low Latency Queues (bsc#1117562).\n- net: ena: explicit casting and initialization, and clearer error handling (bsc#1117562).\n- net: ena: fix auto casting to boolean (bsc#1117562).\n- net: ena: fix compilation error in xtensa architecture (bsc#1117562).\n- net: ena: fix crash during ena_remove() (bsc#1108240).\n- net: ena: fix crash during failed resume from hibernation (bsc#1117562).\n- net: ena: fix indentations in ena_defs for better readability (bsc#1117562).\n- net: ena: Fix Kconfig dependency on X86 (bsc#1117562).\n- net: ena: fix NULL dereference due to untimely napi initialization (bsc#1117562).\n- net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1117562).\n- net: ena: fix warning in rmmod caused by double iounmap (bsc#1117562).\n- net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1117562).\n- net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1117562).\n- net: ena: minor performance improvement (bsc#1117562).\n- net: ena: remove ndo_poll_controller (bsc#1117562).\n- net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1117562).\n- net: ena: update driver version from 2.0.1 to 2.0.2 (bsc#1108240).\n- net: ena: update driver version to 2.0.1 (bsc#1117562).\n- net: ena: use CSUM_CHECKED device indication to report skb\u0027s checksum status (bsc#1117562).\n- net: faraday: ftmac100: remove netif_running(netdev) check before disabling interrupts (bnc#1012382).\n- netfilter: ipset: actually allow allowable CIDR 0 in hash:net,port,net (bnc#1012382).\n- netfilter: ipset: Correct rcu_dereference() call in ip_set_put_comment() (bnc#1012382).\n- netfilter: nf_tables: fix oops when inserting an element into a verdict map (bnc#1012382).\n- netfilter: xt_IDLETIMER: add sysfs filename checking routine (bnc#1012382).\n- net: fix pskb_trim_rcsum_slow() with odd trim offset (bnc#1012382).\n- net: Fix usage of pskb_trim_rcsum (bnc#1012382).\n- net-gro: reset skb-\u003epkt_type in napi_reuse_skb() (bnc#1012382).\n- net: hisilicon: remove unexpected free_netdev (bnc#1012382).\n- net: ibm: fix return type of ndo_start_xmit function ().\n- net/ibmnvic: Fix deadlock problem in reset ().\n- net/ibmvnic: Fix RTNL deadlock during device reset (bnc#1115431).\n- net: ieee802154: 6lowpan: fix frag reassembly (bnc#1012382).\n- net/ipv4: defensive cipso option parsing (bnc#1012382).\n- net: ipv4: do not handle duplicate fragments as overlapping (bnc#1012382 bsc#1116345).\n- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).\n- net: ipv4: Fix memory leak in network namespace dismantle (bnc#1012382).\n- net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs (bnc#1012382).\n- net/mlx4_core: Add masking for a few queries on HCA caps (bnc#1012382).\n- net/mlx4_core: Correctly set PFC param if global pause is turned off (bsc#1015336 bsc#1015337 bsc#1015340).\n- net/mlx4_core: Fix uninitialized variable compilation warning (bnc#1012382).\n- net/mlx4_core: Zero out lkey field in SW2HW_MPT fw command (bnc#1012382).\n- net/mlx4: Fix UBSAN warning of signed integer overflow (bnc#1012382).\n- net: modify skb_rbtree_purge to return the truesize of all purged skbs (bnc#1012382).\n- net: phy: do not allow __set_phy_supported to add unsupported modes (bnc#1012382).\n- net: Prevent invalid access to skb-\u003eprev in __qdisc_drop_all (bnc#1012382).\n- net: pskb_trim_rcsum() and CHECKSUM_COMPLETE are friends (bnc#1012382).\n- net: qla3xxx: Remove overflowing shift statement (bnc#1012382).\n- netrom: fix locking in nr_find_socket() (bnc#1012382).\n- netrom: switch to sock timer API (bnc#1012382).\n- net/rose: fix NULL ax25_cb kernel panic (bnc#1012382).\n- net: sched: gred: pass the right attribute to gred_change_table_def() (bnc#1012382).\n- net_sched: refetch skb protocol for each filter (bnc#1012382).\n- net: socket: fix a missing-check bug (bnc#1012382).\n- net: speed up skb_rbtree_purge() (bnc#1012382).\n- net: stmmac: Fix stmmac_mdio_reset() when building stmmac as modules (bnc#1012382).\n- net: systemport: Fix WoL with password after deep sleep (bnc#1012382).\n- net: thunderx: fix NULL pointer dereference in nic_remove (bnc#1012382).\n- new helper: uaccess_kernel() (bnc#1012382).\n- nfc: nfcmrvl_uart: fix OF child-node lookup (bnc#1012382).\n- nfc: nxp-nci: Include unaligned.h instead of access_ok.h (bnc#1012382).\n- nfit: fix unchecked dereference in acpi_nfit_ctl (bsc#1125014).\n- nfit: skip region registration for incomplete control regions (bsc#1118930).\n- nfsd4: fix crash on writing v4_end_grace before nfsd startup (bnc#1012382).\n- nfsd: Fix an Oops in free_session() (bnc#1012382).\n- nfs: Ensure we commit after writeback is complete (bsc#1111809).\n- nfs: nfs_compare_mount_options always compare auth flavors (bnc#1012382).\n- nfsv4.1: Fix the r/wsize checking (bnc#1012382).\n- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).\n- niu: fix missing checks of niu_pci_eeprom_read (bnc#1012382).\n- nvme: validate controller state before rescheduling keep alive (bsc#1103257).\n- ocfs2: do not clear bh uptodate for block read (bnc#1012382).\n- ocfs2: fix a misuse a of brelse after failing ocfs2_check_dir_entry (bnc#1012382).\n- ocfs2: fix deadlock caused by ocfs2_defrag_extent() (bnc#1012382).\n- ocfs2: fix panic due to unrecovered local alloc (bnc#1012382).\n- ocfs2: fix potential use after free (bnc#1012382).\n- of: add helper to lookup compatible child node (bnc#1012382).\n- omap2fb: Fix stack memory disclosure (bsc#1106929)\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bnc#1012382).\n- packet: Do not leak dev refcounts on error exit (bnc#1012382).\n- packet: validate address length (bnc#1012382).\n- packet: validate address length if non-zero (bnc#1012382).\n- parisc: Fix address in HPMC IVA (bnc#1012382).\n- parisc: Fix map_pages() to not overwrite existing pte entries (bnc#1012382).\n- pci: Add Device IDs for Intel GPU \u0027spurious interrupt\u0027 quirk (bnc#1012382).\n- pci: altera: Check link status before retrain link (bnc#1012382).\n- pci: altera: Fix altera_pcie_link_is_up() (bnc#1012382).\n- pci: altera: Move retrain from fixup to altera_pcie_host_init() (bnc#1012382).\n- pci: altera: Poll for link training status after retraining the link (bnc#1012382).\n- pci: altera: Poll for link up status after retraining the link (bnc#1012382).\n- pci: altera: Reorder read/write functions (bnc#1012382).\n- pci: altera: Rework config accessors for use without a struct pci_bus (bnc#1012382).\n- pci/ASPM: Do not initialize link state when aspm_disabled is set (bsc#1109806).\n- pci/ASPM: Fix link_state teardown on device removal (bsc#1109806).\n- pci: vmd: Detach resources after stopping root bus (bsc#1106105).\n- pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges (bnc#1012382).\n- perf/bpf: Convert perf_event_array to use struct file (bsc#1119967).\n- perf/core: Do not leak event in the syscall error path (bnc#1012382).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (bnc#1012382).\n- perf/core: Fix impossible ring-buffer sizes warning (bnc#1012382).\n- perf intel-pt: Fix error with config term \u0027pt=0\u0027 (bnc#1012382).\n- perf parse-events: Fix unchecked usage of strncpy() (bnc#1012382).\n- perf pmu: Suppress potential format-truncation warning (bnc#1012382).\n- perf/ring_buffer: Prevent concurent ring buffer access (bnc#1012382).\n- perf svghelper: Fix unchecked usage of strncpy() (bnc#1012382).\n- perf tests evsel-tp-sched: Fix bitwise operator (bnc#1012382).\n- perf tools: Add Hygon Dhyana support (bnc#1012382).\n- perf tools: Cleanup trace-event-info \u0027tdata\u0027 leak (bnc#1012382).\n- perf tools: Disable parallelism for \u0027make clean\u0027 (bnc#1012382).\n- perf tools: Free temporary \u0027sys\u0027 string in read_event_files() (bnc#1012382).\n- perf unwind: Take pgoff into account when reporting elf to libdwfl (bnc#1012382).\n- perf unwind: Unwind with libdw does not take symfs into account (bnc#1012382).\n- perf/x86/intel/uncore: Add Node ID mask (bnc#1012382).\n- pinctrl: msm: fix gpio-hog related boot issues (bnc#1012382).\n- pinctrl: qcom: spmi-mpp: Fix drive strength setting (bnc#1012382).\n- pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux (bnc#1012382).\n- pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant (bnc#1012382).\n- pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant (bnc#1012382).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bnc#1012382).\n- platform/x86: acerhdf: Add BIOS entry for Gateway LT31 v1.3307 (bnc#1012382).\n- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bnc#1012382).\n- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bnc#1012382).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bnc#1012382).\n- platform/x86: thinkpad_acpi: Proper model/release matching (bsc#1099810).\n- pm / devfreq: tegra: fix error return code in tegra_devfreq_probe() (bnc#1012382).\n- pNFS: Fix a deadlock between read resends and layoutreturn (git-fixes).\n- pNFS/flexfiles: Fix up the ff_layout_write_pagelist failure path (git-fixes).\n- pNFS/flexfiles: When checking for available DSes, conditionally check for MDS io (git-fixes).\n- pnfs: set NFS_IOHDR_REDO in pnfs_read_resend_pnfs (git-fixes).\n- powerpc/64s: consolidate MCE counter increment (bsc#1094244).\n- powerpc/boot: Ensure _zimage_start is a weak symbol (bnc#1012382).\n- powerpc/boot: Fix random libfdt related build errors (bnc#1012382).\n- powerpc/boot: Request no dynamic linker for boot wrapper (bsc#1070805).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc: Fix COFF zImage booting on old powermacs (bnc#1012382).\n- powerpc: handle RFI (exrfi and fallback area) and STF (exrfi).\n- powerpc, hotplug: Avoid to touch non-existent cpumasks (bsc#1109695).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- powerpc/mm/radix: Use mm-\u003etask_size for boundary checking instead of addr_limit (bsc#1027457).\n- powerpc/msi: Fix compile error on mpc83xx (bnc#1012382).\n- powerpc/msi: Fix NULL pointer access in teardown code (bnc#1012382).\n- powerpc/nohash: fix undefined behaviour when testing page size support (bnc#1012382).\n- powerpc/numa: Suppress \u0027VPHN is not supported\u0027 messages (bnc#1012382).\n- powerpc/powernv: Do not select the cpufreq governors (bsc#1066223).\n- powerpc/powernv: Fix opal_event_shutdown() called with interrupts disabled (bsc#1066223).\n- powerpc/powernv/pci: Work around races in PCI bridge enabling (bsc#1066223).\n- powerpc/pseries: add of_node_put() in dlpar_detach_node() (bnc#1012382).\n- powerpc/pseries/cpuidle: Fix preempt warning (bnc#1012382).\n- powerpc/pseries: Fix DTL buffer registration (bsc#1066223).\n- powerpc/pseries: Fix how we iterate over the DTL entries (bsc#1066223).\n- powerpc/pseries/mobility: Extend start/stop topology update scope (bsc#1116950, bsc#1115709).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/traps: restore recoverability of machine_check interrupts (bsc#1094244).\n- powerpc/uaccess: fix warning/error with access_ok() (bnc#1012382).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- power: supply: olpc_battery: correct the temperature units (bnc#1012382).\n- printk: Fix panic caused by passing log_buf_len to command line (bnc#1012382).\n- proc: Remove empty line in /proc/self/status (bnc#1012382 bsc#1094823).\n- Provide a temporary fix for STIBP on-by-default See bsc#1116497 for details.\n- pstore: Convert console write to use -\u003ewrite_buf (bnc#1012382).\n- pstore/ram: Do not treat empty buffers as valid (bnc#1012382).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bnc#1012382).\n- ptp: fix Spectre v1 vulnerability (bnc#1012382).\n- pxa168fb: prepare the clock (bnc#1012382).\n- qed: Fix bitmap_weight() check (bsc#1019695).\n- qed: Fix PTT leak in qed_drain() (bnc#1012382).\n- qed: Fix QM getters to always return a valid pq (bsc#1019695 ).\n- qed: Fix reading wrong value in loop condition (bnc#1012382).\n- r8152: Check for supported Wake-on-LAN Modes (bnc#1012382).\n- r8169: Add support for new Realtek Ethernet (bnc#1012382).\n- r8169: fix NAPI handling under high load (bnc#1012382).\n- rapidio/rionet: do not free skb before reading its length (bnc#1012382).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125808).\n- rcu: Force boolean subscript for expedited stall warnings (bnc#1012382).\n- RDMA/bnxt_re: Fix a couple off by one bugs (bsc#1020413, ).\n- RDMA/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446).\n- RDMA/ucma: Fix Spectre v1 vulnerability (bnc#1012382).\n- Refresh patches.kabi/x86-cpufeature-preserve-numbers.patch. (bsc#1122651)\n- reiserfs: propagate errors from fill_with_dentries() properly (bnc#1012382).\n- Revert \u0027Bluetooth: h5: Fix missing dependency on BT_HCIUART_SERDEV\u0027 (bnc#1012382).\n- Revert \u0027ceph: fix dentry leak in splice_dentry()\u0027 (bsc#1114839).\n- Revert \u0027cifs: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs)\u0027 (bnc#1012382).\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1106929)\n- Revert \u0027exec: load_script: do not blindly truncate shebang string\u0027 (bnc#1012382).\n- Revert \u0027Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G\u0027 (bnc#1012382).\n- Revert \u0027iommu/io-pgtable-arm: Check for v7s-incapable systems\u0027 (bsc#1106105).\n- Revert \u0027loop: Fix double mutex_unlock(\u0026loop_ctl_mutex) in loop_control_ioctl()\u0027 (bnc#1012382).\n- Revert \u0027loop: Fold __loop_release into loop_release\u0027 (bnc#1012382).\n- Revert \u0027loop: Get rid of loop_index_mutex\u0027 (bnc#1012382).\n- Revert \u0027media: videobuf2-core: do not call memop \u0027finish\u0027 when queueing\u0027 (bnc#1012382).\n- Revert \u0027mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).\u0027 The backport patch does not built properly.\n- Revert \u0027PCI/ASPM: Do not initialize link state when aspm_disabled is set\u0027 (bsc#1106105).\n- Revert \u0027usb: musb: musb_host: Enable HCD_BH flag to handle urb return in bottom half\u0027 (bsc#1047487).\n- Revert \u0027wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout()\u0027 (bnc#1012382).\n- rhashtable: Add rhashtable_lookup() (bnc#1012382).\n- rhashtable: add rhashtable_lookup_get_insert_key() (bnc#1012382 bsc#1042286).\n- rhashtable: add schedule points (bnc#1012382).\n- rhashtable: reorganize struct rhashtable layout (bnc#1012382).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bnc#1012382).\n- rpcrdma: Add RPCRDMA_HDRLEN_ERR (git-fixes).\n- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1042286 bsc#1108145).\n- rtc: hctosys: Add missing range error reporting (bnc#1012382).\n- rtc: snvs: add a missing write sync (bnc#1012382).\n- rtc: snvs: Add timeouts to avoid kernel lockups (bnc#1012382).\n- rtnetlink: Disallow FDB configuration for non-Ethernet device (bnc#1012382).\n- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (bnc#1012382).\n- s390/cpum_cf: Reject request for sampling in event initialization (bnc#1012382).\n- s390/early: improve machine detection (bnc#1012382).\n- s390/mm: Check for valid vma before zapping in gmap_discard (bnc#1012382).\n- s390/mm: Fix ERROR: \u0027__node_distance\u0027 undefined! (bnc#1012382).\n- s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1114475, LTC#172682).\n- s390/qeth: fix HiperSockets sniffer (bnc#1114475, LTC#172953).\n- s390/qeth: fix length check in SNMP processing (bnc#1012382).\n- s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1114475, LTC#172682).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (bnc#1012382).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (bnc#1012382).\n- s390/vdso: add missing FORCE to build targets (bnc#1012382).\n- sata_rcar: fix deferred probing (bnc#1012382).\n- sbus: char: add of_node_put() (bnc#1012382).\n- sc16is7xx: Fix for multi-channel stall (bnc#1012382).\n- sched/cgroup: Fix cgroup entity load tracking tear-down (bnc#1012382).\n- sched/fair: Fix throttle_list starvation with low CFS quota (bnc#1012382).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- sch_red: update backlog as well (bnc#1012382).\n- scripts/decode_stacktrace: only strip base path when a prefix of the path (bnc#1012382).\n- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes\n- scsi: aacraid: Fix typo in blink status (bnc#1012382).\n- scsi: bfa: convert to strlcpy/strlcat (bnc#1012382 bsc#1019683, ).\n- scsi: bnx2fc: Fix NULL dereference in error handling (bnc#1012382).\n- scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).\n- scsi: Create two versions of scsi_internal_device_unblock() (bsc#1119877).\n- scsi: csiostor: Avoid content leaks and casts (bnc#1012382).\n- scsi: esp_scsi: Track residual for PIO transfers (bnc#1012382).\n- scsi: Introduce scsi_start_queue() (bsc#1119877).\n- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1103624, bsc#1104731).\n- scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).\n- scsi: libiscsi: Fix NULL pointer dereference in iscsi_eh_session_reset (bnc#1012382).\n- scsi: lpfc: Add Buffer overflow check, when nvme_info larger than PAGE_SIZE (bsc#1102660).\n- scsi: lpfc: Correct LCB RJT handling (bnc#1012382).\n- scsi: lpfc: Correct MDS diag and nvmet configuration (bsc#1125796).\n- scsi: lpfc: Correct soft lockup when running mds diagnostics (bnc#1012382).\n- scsi: lpfc: devloss timeout race condition caused null pointer reference (bsc#1102660).\n- scsi: lpfc: Fix abort error path for NVMET (bsc#1102660).\n- scsi: lpfc: fix block guard enablement on SLI3 adapters (bsc#1079935).\n- scsi: lpfc: Fix driver crash when re-registering NVME rports (bsc#1102660).\n- scsi: lpfc: Fix ELS abort on SLI-3 adapters (bsc#1102660).\n- scsi: lpfc: Fix list corruption on the completion queue (bsc#1102660).\n- scsi: lpfc: Fix NVME Target crash in defer rcv logic (bsc#1102660).\n- scsi: lpfc: Fix panic if driver unloaded when port is offline (bsc#1102660).\n- scsi: lpfc: update driver version to 11.4.0.7-5 (bsc#1102660).\n- scsi: Make __scsi_remove_device go straight from BLOCKED to DEL (bsc#1119877).\n- scsi: megaraid: fix out-of-bound array accesses (bnc#1012382).\n- scsi: megaraid_sas: fix a missing-check bug (bnc#1012382).\n- scsi: mpt3sas: Add an I/O barrier (bsc#1117108).\n- scsi: mpt3sas: Added support for nvme encapsulated request message (bsc#1117108).\n- scsi: mpt3sas: Added support for SAS Device Discovery Error Event (bsc#1117108).\n- scsi: mpt3sas: Adding support for SAS3616 HBA device (bsc#1117108).\n- scsi: mpt3sas: Add ioc_\u003clevel\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Add nvme device support in slave alloc, target alloc and probe (bsc#1117108).\n- scsi: mpt3sas: Add PCI device ID for Andromeda (bsc#1117108).\n- scsi: mpt3sas: Add-Task-management-debug-info-for-NVMe-drives (bsc#1117108).\n- scsi: mpt3sas: Allow processing of events during driver unload (bsc#1117108).\n- scsi: mpt3sas: always use first reserved smid for ioctl passthrough (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: API\u0027s to remove nvme drive from sml (bsc#1117108).\n- scsi: mpt3sas: API \u0027s to support NVMe drive addition to SML (bsc#1117108).\n- scsi: mpt3sas: As per MPI-spec, use combined reply queue for SAS3.5 controllers when HBA supports more than 16 MSI-x vectors (bsc#1117108).\n- scsi: mpt3sas: Bug fix for big endian systems (bsc#1117108).\n- scsi: mpt3sas: Bump mpt3sas driver version to v16.100.00.00 (bsc#1117108).\n- scsi: mpt3sas: Cache enclosure pages during enclosure add (bsc#1117108).\n- scsi: mpt3sas: check command status before attempting abort (bsc#1117108).\n- scsi: mpt3sas: clarify mmio pointer types (bsc#1117108).\n- scsi: mpt3sas: cleanup _scsih_pcie_enumeration_event() (bsc#1117108).\n- scsi: mpt3sas: Configure reply post queue depth, DMA and sgl tablesize (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u003clevel\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u003clevel\u003e with MPT3SAS_FMT to ioc_\u003clevel\u003e (bsc#1117108).\n- scsi: mpt3sas: Display chassis slot information of the drive (bsc#1117108).\n- scsi: mpt3sas: Do not abort I/Os issued to NVMe drives while processing Async Broadcast primitive event (bsc#1117108).\n- scsi: mpt3sas: Do not access the structure after decrementing it\u0027s instance reference count (bsc#1117108).\n- scsi: mpt3sas: Do not use 32-bit atomic request descriptor for Ventura controllers (bsc#1117108).\n- scsi: mpt3sas: Enhanced handling of Sense Buffer (bsc#1117108).\n- scsi: mpt3sas: fix an out of bound write (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix calltrace observed while running IO \u0026 reset (bsc#1117108).\n- scsi: mpt3sas: fix dma_addr_t casts (bsc#1117108).\n- scsi: mpt3sas: Fixed memory leaks in driver (bsc#1117108).\n- scsi: mpt3sas: Fix, False timeout prints for ioctl and other internal commands during controller reset (bsc#1117108).\n- scsi: mpt3sas: fix format overflow warning (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Fix memory allocation failure test in \u0027mpt3sas_base_attach()\u0027 (bsc#1117108).\n- scsi: mpt3sas: Fix nvme drives checking for tlr (bsc#1117108).\n- scsi: mpt3sas: fix oops in error handlers after shutdown/unload (bsc#1117108).\n- scsi: mpt3sas: Fix possibility of using invalid Enclosure Handle for SAS device after host reset (bsc#1117108).\n- scsi: mpt3sas: fix possible memory leak (bsc#1117108).\n- scsi: mpt3sas: fix pr_info message continuation (bsc#1117108).\n- scsi: mpt3sas: Fix removal and addition of vSES device during host reset (bsc#1117108).\n- scsi: mpt3sas: Fix sparse warnings (bsc#1117108).\n- scsi: mpt3sas: fix spelling mistake: \u0027disbale\u0027 -\u003e \u0027disable\u0027 (bsc#1117108).\n- scsi: mpt3sas: For NVME device, issue a protocol level reset (bsc#1117108).\n- scsi: mpt3sas: Handle NVMe PCIe device related events generated from firmware (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Incorrect command status was set/marked as not used (bsc#1117108).\n- scsi: mpt3sas: Increase event log buffer to support 24 port HBA\u0027s (bsc#1117108).\n- scsi: mpt3sas: Introduce API to get BAR0 mapped buffer address (bsc#1117108).\n- scsi: mpt3sas: Introduce Base function for cloning (bsc#1117108).\n- scsi: mpt3sas: Introduce function to clone mpi reply (bsc#1117108).\n- scsi: mpt3sas: Introduce function to clone mpi request (bsc#1117108).\n- scsi: mpt3sas: Introduce mpt3sas_get_st_from_smid() (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Lockless access for chain buffers (bsc#1117108).\n- scsi: mpt3sas: lockless command submission (bsc#1117108).\n- scsi: mpt3sas: make function _get_st_from_smid static (bsc#1117108).\n- scsi: mpt3sas: NVMe drive support for BTDHMAPPING ioctl command and log info (bsc#1117108).\n- scsi: mpt3sas: open-code _scsih_scsi_lookup_get() (bsc#1117108).\n- scsi: mpt3sas: Optimize I/O memory consumption in driver (bsc#1117108).\n- scsi: mpt3sas: Pre-allocate RDPQ Array at driver boot time (bsc#1117108).\n- scsi: mpt3sas: Processing of Cable Exception events (bsc#1117108).\n- scsi: mpt3sas: Reduce memory footprint in kdump kernel (bsc#1117108).\n- scsi: mpt3sas: remove a stray KERN_INFO (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: remove redundant copy_from_user in _ctl_getiocinfo (bsc#1117108).\n- scsi: mpt3sas: remove redundant wmb (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Remove unused variable requeue_event (bsc#1117108).\n- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).\n- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).\n- scsi: mpt3sas: Report Firmware Package Version from HBA Driver (bsc#1117108).\n- scsi: mpt3sas: scan and add nvme device after controller reset (bsc#1117108).\n- scsi: mpt3sas: separate out _base_recovery_check() (bsc#1117108).\n- scsi: mpt3sas: set default value for cb_idx (bsc#1117108).\n- scsi: mpt3sas: Set NVMe device queue depth as 128 (bsc#1117108).\n- scsi: mpt3sas: SGL to PRP Translation for I/Os to NVMe devices (bsc#1117108).\n- scsi: mpt3sas: simplify mpt3sas_scsi_issue_tm() (bsc#1117108).\n- scsi: mpt3sas: simplify task management functions (bsc#1117108).\n- scsi: mpt3sas: simplify _wait_for_commands_to_complete() (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: switch to pci_alloc_irq_vectors (bsc#1117108).\n- scsi: mpt3sas: Updated MPI headers to v2.00.48 (bsc#1117108).\n- scsi: mpt3sas: Update driver version \u002725.100.00.00\u0027 (bsc#1117108).\n- scsi: mpt3sas: Update driver version \u002726.100.00.00\u0027 (bsc#1117108).\n- scsi: mpt3sas: Update MPI Headers (bsc#1117108).\n- scsi: mpt3sas: Update mpt3sas driver version (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mpt3sas: use list_splice_init() (bsc#1117108).\n- scsi: mpt3sas: wait for and flush running commands on shutdown/unload (bsc#1117108).\n- scsi: Protect SCSI device state changes with a mutex (bsc#1119877).\n- scsi: qedi: Add ISCSI_BOOT_SYSFS to Kconfig (bsc#1043083).\n- scsi: qla2xxx: Fix crashes in qla2x00_probe_one on probe failure (bsc#1094973).\n- scsi: qla2xxx: Fix deadlock between ATIO and HW lock (bsc#1125794).\n- scsi: qla2xxx: Fix incorrect port speed being set for FC adapters (bnc#1012382).\n- scsi: qla2xxx: Fix small memory leak in qla2x00_probe_one on probe failure (bsc#1094973).\n- scsi: Re-export scsi_internal_device_{,un}_block() (bsc#1119877).\n- scsi: sd: Fix cache_type_store() (bnc#1012382).\n- scsi: Split scsi_internal_device_block() (bsc#1119877).\n- scsi: target: add emulate_pr backstore attr to toggle PR support (bsc#1091405).\n- scsi: target: drop unused pi_prot_format attribute storage (bsc#1091405).\n- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).\n- scsi: target: use consistent left-aligned ASCII INQUIRY data (bnc#1012382).\n- scsi: ufs: fix bugs related to null pointer access and array size (bnc#1012382).\n- scsi: ufs: fix race between clock gating and devfreq scaling work (bnc#1012382).\n- scsi: ufshcd: Fix race between clk scaling and ungate work (bnc#1012382).\n- scsi: ufshcd: release resources if probe fails (bnc#1012382).\n- scsi: use \u0027inquiry_mutex\u0027 instead of \u0027state_mutex\u0027 (bsc#1119877).\n- scsi: vmw_pscsi: Rearrange code to avoid multiple calls to free_irq during unload (bnc#1012382).\n- scsi: zfcp: fix posting too many status read buffers leading to adapter shutdown (bnc#1012382).\n- sctp: allocate sctp_sockaddr_entry with kzalloc (bnc#1012382).\n- sctp: clear the transport of some out_chunk_list chunks in sctp_assoc_rm_peer (bnc#1012382).\n- sctp: fix race on sctp_id2asoc (bnc#1012382).\n- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (bnc#1012382).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selftests: ftrace: Add synthetic event syntax testcase (bnc#1012382).\n- selftests: Move networking/timestamping from Documentation (bnc#1012382).\n- selinux: fix GPF on invalid policy (bnc#1012382).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bnc#1012382).\n- seq_file: fix incomplete reset on read from zero offset (Git-fixes).\n- ser_gigaset: use container_of() instead of detour (bnc#1012382).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bnc#1012382).\n- signal: Always deliver the kernel\u0027s SIGKILL and SIGSTOP to a pid namespace init (bnc#1012382).\n- signal: Always notice exiting tasks (bnc#1012382).\n- signal: Better detection of synchronous signals (bnc#1012382).\n- signal/GenWQE: Fix sending of SIGKILL (bnc#1012382).\n- signal: Restore the stop PTRACE_EVENT_EXIT (bnc#1012382).\n- skge: potential memory corruption in skge_get_regs() (bnc#1012382).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (bnc#1012382).\n- smack: fix access permissions for keyring (bnc#1012382).\n- smb3: allow stats which track session and share reconnects to be reset (bnc#1012382).\n- smb3: do not attempt cifs operation in smb3 query info error path (bnc#1012382).\n- smb3: on kerberos mount if server does not specify auth type use krb5 (bnc#1012382).\n- smsc75xx: Check for Wake-on-LAN modes (bnc#1012382).\n- smsc95xx: Check for Wake-on-LAN modes (bnc#1012382).\n- smsc95xx: Use skb_cow_head to deal with cloned skbs (bnc#1012382).\n- sock: Make sock-\u003esk_stamp thread-safe (bnc#1012382).\n- soc/tegra: Do not leak device tree node reference (bnc#1012382).\n- soc/tegra: pmc: Fix child-node lookup (bnc#1012382).\n- sparc64: Fix exception handling in UltraSPARC-III memcpy (bnc#1012382).\n- sparc64 mm: Fix more TSB sizing issues (bnc#1012382).\n- sparc: Fix single-pcr perf event counter management (bnc#1012382).\n- sparc/pci: Refactor dev_archdata initialization into pci_init_dev_archdata (bnc#1012382).\n- spi: bcm2835: Avoid finishing transfer prematurely in IRQ mode (bnc#1012382).\n- spi: bcm2835: Fix book-keeping of DMA termination (bnc#1012382).\n- spi: bcm2835: Fix race on DMA termination (bnc#1012382).\n- spi: bcm2835: Unbreak the build of esoteric configs (bnc#1012382).\n- spi/bcm63xx: fix error return code in bcm63xx_spi_probe() (bnc#1012382).\n- spi/bcm63xx-hspi: fix error return code in bcm63xx_hsspi_probe() (bnc#1012382).\n- spi: xlp: fix error return code in xlp_spi_probe() (bnc#1012382).\n- sr9800: Check for supported Wake-on-LAN modes (bnc#1012382).\n- sr: pass down correctly sized SCSI sense buffer (bnc#1012382).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bnc#1012382).\n- staging: iio: ad7780: update voltage on read (bnc#1012382).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bnc#1012382).\n- staging: lustre: remove two build warnings (bnc#1012382).\n- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bnc#1012382).\n- staging: rts5208: fix gcc-8 logic error warning (bnc#1012382).\n- staging: speakup: Replace strncpy with memcpy (bnc#1012382).\n- sunrpc: correct the computation for page_ptr when truncating (bnc#1012382).\n- sunrpc: drop pointless static qualifier in xdr_get_next_encode_buffer() (bnc#1012382).\n- sunrpc: Fix a bogus get/put in generic_key_to_expire() (bnc#1012382).\n- sunrpc: Fix a potential race in xprt_connect() (git-fixes).\n- sunrpc: fix cache_head leak due to queued request (bnc#1012382).\n- sunrpc: Fix leak of krb5p encode pages (bnc#1012382).\n- sunrpc: handle ENOMEM in rpcb_getport_async (bnc#1012382).\n- sunvdc: Do not spin in an infinite loop when vio_ldc_send() returns EAGAIN (bnc#1012382).\n- svcrdma: Remove unused variable in rdma_copy_tail() (git-fixes).\n- swim: fix cleanup on setup error (bnc#1012382).\n- swiotlb: clean up reporting (bnc#1012382).\n- sysfs: Disable lockdep for driver bind/unbind files (bnc#1012382).\n- sysv: return \u0027err\u0027 instead of 0 in __sysv_write_inode (bnc#1012382).\n- target/iscsi: avoid NULL dereference in CHAP auth error path (bsc#1117165).\n- target: se_dev_attrib.emulate_pr ABI stability (bsc#1091405).\n- tcp: fix NULL ref in tail loss probe (bnc#1012382).\n- TC: Set DMA masks for devices (bnc#1012382).\n- termios, tty/tty_baudrate.c: fix buffer overrun (bnc#1012382).\n- test_hexdump: use memcpy instead of strncpy (bnc#1012382).\n- tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths (bnc#1012382).\n- thermal: allow spear-thermal driver to be a module (bnc#1012382).\n- thermal: allow u8500-thermal driver to be a module (bnc#1012382).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bnc#1012382).\n- timekeeping: Use proper seqcount initializer (bnc#1012382).\n- timer/debug: Change /proc/timer_list from 0444 to 0400 (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bnc#1012382).\n- tipc: use destination length for copy string (bnc#1012382).\n- tmpfs: make lseek(SEEK_DATA/SEK_HOLE) return ENXIO with a negative offset (bnc#1012382).\n- tpm: fix response size validation in tpm_get_random() (bsc#1020645, git-fixes).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bnc#1012382).\n- tracing: Fix bad use of igrab in trace_uprobe.c (bsc#1120046).\n- tracing: Fix memory leak in set_trigger_filter() (bnc#1012382).\n- tracing: Fix memory leak of instance function hash filters (bnc#1012382).\n- tracing: Skip more functions when doing stack tracing of events (bnc#1012382).\n- tracing/uprobes: Fix output for multiple string arguments (bnc#1012382).\n- tty: check name length in tty_find_polling_driver() (bnc#1012382).\n- tty: Do not block on IO when ldisc change is pending (bnc#1105428).\n- tty: Do not hold ldisc lock in tty_reopen() if ldisc present (bnc#1105428).\n- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).\n- tty: Handle problem if line discipline does not have receive_buf (bnc#1012382).\n- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).\n- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).\n- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).\n- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).\n- tty/ldsem: Wake up readers after timed out down_write() (bnc#1012382).\n- tty/n_hdlc: fix __might_sleep warning (bnc#1012382).\n- tty: serial: 8250_mtk: always resume the device in probe (bnc#1012382).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bnc#1012382).\n- tty: serial: sprd: fix error return code in sprd_probe() (bnc#1012382).\n- tty: Simplify tty-\u003ecount math in tty_reopen() (bnc#1105428).\n- tty: wipe buffer (bnc#1012382).\n- tty: wipe buffer if not echoing data (bnc#1012382).\n- tun: Consistently configure generic netdev params via rtnetlink (bnc#1012382).\n- tun: forbid iface creation with rtnl ops (bnc#1012382).\n- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (bnc#1012382).\n- uapi/if_ether.h: prevent redefinition of struct ethhdr (bnc#1012382).\n- ucc_geth: Reset BQL queue when stopping device (bnc#1012382).\n- udf: Fix BUG on corrupted inode (bnc#1012382).\n- uio: ensure class is registered before devices (bnc#1012382).\n- uio: Fix an Oops on load (bnc#1012382).\n- uio: make symbol \u0027uio_class_registered\u0027 static (git-fixes).\n- um: Avoid longjmp/setjmp symbol clashes with libpthread.a (bnc#1012382).\n- um: Avoid marking pages with \u0027changed protection\u0027 (bnc#1012382).\n- um: Give start_idle_thread() a return code (bnc#1012382).\n- unifdef: use memcpy instead of strncpy (bnc#1012382).\n- Update ibmvnic: Fix RX queue buffer cleanup (bsc#1115440, bsc#1115433).\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bnc#1012382).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bnc#1012382).\n- usb: appledisplay: Add 27\u0027 Apple Cinema Display (bnc#1012382).\n- usb: cdc-acm: add entry for Hiro (Conexant) modem (bnc#1012382).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bnc#1012382).\n- usb: check usb_get_extra_descriptor for proper size (bnc#1012382).\n- usb: chipidea: Prevent unbalanced IRQ disable (bnc#1012382).\n- usb: core: Fix hub port connection events lost (bnc#1012382).\n- usb: core: quirks: add RESET_RESUME quirk for Cherry G230 Stream series (bnc#1012382).\n- usb: dwc2: Remove unnecessary kfree (bnc#1012382).\n- usb: dwc3: omap: fix error return code in dwc3_omap_probe() (bnc#1012382).\n- usb: ehci-omap: fix error return code in ehci_hcd_omap_probe() (bnc#1012382).\n- usb: fix the usbfs flag sanitization for control transfers (bnc#1012382).\n- usb: gadget: dummy: fix nonsensical comparisons (bnc#1012382).\n- usb: gadget: storage: Fix Spectre v1 vulnerability (bnc#1012382).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bnc#1012382).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bnc#1012382).\n- usb: imx21-hcd: fix error return code in imx21_probe() (bnc#1012382).\n- usb: misc: appledisplay: add 20\u0027 Apple Cinema Display (bnc#1012382).\n- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (bnc#1012382).\n- usb: omap_udc: fix crashes on probe error and module removal (bnc#1012382).\n- usb: omap_udc: fix omap_udc_start() on 15xx machines (bnc#1012382).\n- usb: omap_udc: fix USB gadget functionality on Palm Tungsten E (bnc#1012382).\n- usb: omap_udc: use devm_request_irq() (bnc#1012382).\n- usb: phy: am335x: fix race condition in _probe (bnc#1012382).\n- usb: quirk: add no-LPM quirk on SanDisk Ultra Flair device (bnc#1012382).\n- usb: quirks: Add delay-init quirk for Corsair K70 LUX RGB (bnc#1012382).\n- usb: quirks: Add no-lpm quirk for Raydium touchscreens (bnc#1012382).\n- usb: r8a66597: Fix a possible concurrency use-after-free bug in r8a66597_endpoint_disable() (bnc#1012382).\n- usb: serial: option: add Fibocom NL668 series (bnc#1012382).\n- usb: serial: option: add Fibocom NL678 series (bnc#1012382).\n- usb: serial: option: add GosunCn ZTE WeLink ME3630 (bnc#1012382).\n- usb: serial: option: add HP lt4132 (bnc#1012382).\n- usb: serial: option: add Simcom SIM7500/SIM7600 (MBIM mode) (bnc#1012382).\n- usb: serial: option: add Telit LN940 series (bnc#1012382).\n- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bnc#1012382).\n- usb: serial: pl2303: add new PID to support PL2303TB (bnc#1012382).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bnc#1012382).\n- usb: storage: add quirk for SMI SM3350 (bnc#1012382).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bnc#1012382).\n- usb-storage: fix bogus hardware error messages for ATA pass-thru devices (bnc#1012382).\n- usb: usb-storage: Add new IDs to ums-realtek (bnc#1012382).\n- usb: xhci: fix timeout for transition from RExit to U0 (bnc#1012382).\n- usb: xhci: fix uninitialized completion when USB3 port got wrong status (bnc#1012382).\n- usb: xhci: Prevent bus suspend if a port connect change or polling state is detected (bnc#1012382).\n- v9fs_dir_readdir: fix double-free on p9stat_read error (bnc#1012382).\n- vfs: Avoid softlockups in drop_pagecache_sb() (bsc#1118505).\n- vhost: Fix Spectre V1 vulnerability (bnc#1012382).\n- vhost: make sure used idx is seen before log in vhost_add_used_n() (bnc#1012382).\n- vhost/scsi: truncate T10 PI iov_iter to prot_bytes (bnc#1012382).\n- video: clps711x-fb: release disp device node in probe() (bnc#1012382).\n- video: fbdev: pxa3xx_gcu: fix error return code in pxa3xx_gcu_probe() (bnc#1012382).\n- virtio/s390: avoid race on vcdev-\u003econfig (bnc#1012382).\n- virtio/s390: fix race in ccw_io_helper() (bnc#1012382).\n- VSOCK: Send reset control packet when socket is partially bound (bnc#1012382).\n- vti6: flush x-netns xfrm cache when vti interface is removed (bnc#1012382).\n- vt: invoke notifier on screen size change (bnc#1012382).\n- w1: omap-hdq: fix missing bus unregister at removal (bnc#1012382).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86/a.out: Clear the dump structure initially (bnc#1012382).\n- x86: boot: Fix EFI stub alignment (bnc#1012382).\n- x86/boot: #undef memcpy() et al in string.c (bnc#1012382).\n- x86/build: Fix stack alignment for CLang (bnc#1012382).\n- x86/build: Specify stack alignment for clang (bnc#1012382).\n- x86/build: Use __cc-option for boot code compiler options (bnc#1012382).\n- x86/build: Use cc-option to validate stack alignment parameter (bnc#1012382).\n- x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided (bnc#1012382).\n- x86/earlyprintk/efi: Fix infinite loop on some screen widths (bnc#1012382).\n- x86/entry: spell EBX register correctly in documentation (bnc#1012382).\n- x86/fpu: Add might_fault() to user_insn() (bnc#1012382).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bnc#1012382).\n- x86/kbuild: Use cc-option to enable -falign-{jumps/loops} (bnc#1012382).\n- x86/kconfig: Fall back to ticket spinlocks (bnc#1012382).\n- x86/MCE: Export memory_error() (bsc#1114648).\n- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bnc#1012382).\n- x86/MCE: Make correctable error detection look at the Deferred bit (bsc#1114648).\n- x86/mm/kaslr: Use the _ASM_MUL macro for multiplication to work around Clang incompatibility (bnc#1012382).\n- x86/mm/pat: Prevent hang during boot when mapping pages (bnc#1012382).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bnc#1012382).\n- x86/PCI: Fix Broadcom CNB20LE unintended sign extension (redux) (bnc#1012382).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1106105).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bnc#1012382).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/speculation/l1tf: Drop the swap storage limit restriction when l1tf=off (bnc#1114871).\n- x86/speculation: Use synthetic bits for IBRS/IBPB/STIBP (bnc#1012382).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- xen/balloon: Support xend-based toolstack (bnc#1065600).\n- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).\n- xen: fix race in xen_qlock_wait() (bnc#1012382).\n- xen: fix xen_qlock_wait() (bnc#1012382).\n- xen: make xen_qlock_wait() nestable (bnc#1012382).\n- xen/netback: dont overflow meta array (bnc#1099523).\n- xen/netfront: tolerate frags with no data (bnc#1012382).\n- xen-swiotlb: use actually allocated size on check physical continuous (bnc#1012382).\n- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).\n- xen: xlate_mmu: add missing header to fix \u0027W=1\u0027 warning (bnc#1012382).\n- xfrm6: call kfree_skb when skb is toobig (bnc#1012382).\n- xfrm6_tunnel: Fix spi check in __xfrm6_tunnel_alloc_spi (bnc#1012382).\n- xfrm: Clear sk_dst_cache when applying per-socket policy (bnc#1012382).\n- xfrm: Fix bucket count reported to userspace (bnc#1012382).\n- xfrm: use complete IPv6 addresses for hash (bsc#1109330).\n- xfrm: Validate address prefix lengths in the xfrm selector (bnc#1012382).\n- xfrm: validate template mode (bnc#1012382).\n- xfs: Align compat attrlist_by_handle with native implementation (git-fixes).\n- xfs/dmapi: restore event in xfs_getbmap (bsc#1114763).\n- xfs: Fix error code in \u0027xfs_ioc_getbmap()\u0027 (git-fixes).\n- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).\n- xhci: Add quirk to workaround the errata seen on Cavium Thunder-X2 Soc (bsc#1117162).\n- xhci: Do not prevent USB2 bus suspend in state check intended for USB3 only (bnc#1012382).\n- xhci: Prevent U1/U2 link pm states if exit latency is too long (bnc#1012382).\n- xprtrdma: checking for NULL instead of IS_ERR() (git-fixes).\n- xprtrdma: Disable pad optimization by default (git-fixes).\n- xprtrdma: Disable RPC/RDMA backchannel debugging messages (git-fixes).\n- xprtrdma: Fix additional uses of spin_lock_irqsave(rb_lock) (git-fixes).\n- xprtrdma: Fix backchannel allocation of extra rpcrdma_reps (git-fixes).\n- xprtrdma: Fix Read chunk padding (git-fixes).\n- xprtrdma: Fix receive buffer accounting (git-fixes).\n- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).\n- xprtrdma: rpcrdma_bc_receive_call() should init rq_private_buf.len (git-fixes).\n- xprtrdma: Serialize credit accounting again (git-fixes).\n- xprtrdma: xprt_rdma_free() must not release backchannel reqs (git-fixes).\n- xtensa: add NOTES section to the linker script (bnc#1012382).\n- xtensa: enable coprocessors that are being flushed (bnc#1012382).\n- xtensa: fix boot parameters address translation (bnc#1012382).\n- xtensa: fix coprocessor context offset definitions (bnc#1012382).\n- xtensa: make sure bFLT stack is 16 byte aligned (bnc#1012382).\n- yama: Check for pid death before checking ancestry (bnc#1012382).\n- zram: close udev startup race condition as default groups (bnc#1012382).\n- xfrm: refine validation of template and selector families (bnc#1012382).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-541,SUSE-SLE-DESKTOP-12-SP3-2019-541,SUSE-SLE-HA-12-SP3-2019-541,SUSE-SLE-Live-Patching-12-SP3-2019-541,SUSE-SLE-SDK-12-SP3-2019-541,SUSE-SLE-SERVER-12-SP3-2019-541,SUSE-SLE-WE-12-SP3-2019-541", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0541-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0541-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190541-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0541-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005168.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1015336", "url": "https://bugzilla.suse.com/1015336" }, { "category": "self", "summary": "SUSE Bug 1015337", "url": "https://bugzilla.suse.com/1015337" }, { "category": "self", "summary": "SUSE Bug 1015340", "url": "https://bugzilla.suse.com/1015340" }, { "category": "self", "summary": "SUSE Bug 1019683", "url": "https://bugzilla.suse.com/1019683" }, { "category": "self", "summary": "SUSE Bug 1019695", "url": "https://bugzilla.suse.com/1019695" }, { "category": "self", "summary": "SUSE Bug 1020413", "url": "https://bugzilla.suse.com/1020413" }, { "category": "self", "summary": "SUSE Bug 1020645", "url": "https://bugzilla.suse.com/1020645" }, { "category": "self", "summary": "SUSE Bug 1023175", "url": "https://bugzilla.suse.com/1023175" }, { "category": "self", "summary": "SUSE Bug 1027260", "url": "https://bugzilla.suse.com/1027260" }, { "category": "self", "summary": "SUSE Bug 1027457", "url": "https://bugzilla.suse.com/1027457" }, { "category": "self", "summary": "SUSE Bug 1031492", "url": "https://bugzilla.suse.com/1031492" }, { "category": "self", "summary": "SUSE Bug 1042286", "url": "https://bugzilla.suse.com/1042286" }, { "category": "self", "summary": "SUSE Bug 1043083", "url": "https://bugzilla.suse.com/1043083" }, { "category": "self", "summary": "SUSE Bug 1046264", "url": "https://bugzilla.suse.com/1046264" }, { "category": "self", "summary": "SUSE Bug 1047487", "url": "https://bugzilla.suse.com/1047487" }, { "category": "self", "summary": "SUSE Bug 1048916", "url": "https://bugzilla.suse.com/1048916" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1066223", "url": "https://bugzilla.suse.com/1066223" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1070805", "url": "https://bugzilla.suse.com/1070805" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1079935", "url": "https://bugzilla.suse.com/1079935" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086423", "url": "https://bugzilla.suse.com/1086423" }, { "category": "self", "summary": "SUSE Bug 1086652", "url": "https://bugzilla.suse.com/1086652" }, { "category": "self", "summary": "SUSE Bug 1091405", "url": "https://bugzilla.suse.com/1091405" }, { "category": "self", "summary": "SUSE Bug 1093158", "url": "https://bugzilla.suse.com/1093158" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1094823", "url": "https://bugzilla.suse.com/1094823" }, { "category": "self", "summary": "SUSE Bug 1094973", "url": "https://bugzilla.suse.com/1094973" }, { "category": "self", "summary": "SUSE Bug 1096242", "url": "https://bugzilla.suse.com/1096242" }, { "category": "self", "summary": "SUSE Bug 1096281", "url": "https://bugzilla.suse.com/1096281" }, { "category": "self", "summary": "SUSE Bug 1099523", "url": "https://bugzilla.suse.com/1099523" }, { "category": "self", "summary": "SUSE Bug 1099810", "url": "https://bugzilla.suse.com/1099810" }, { "category": "self", "summary": "SUSE Bug 1100105", "url": "https://bugzilla.suse.com/1100105" }, { "category": "self", "summary": "SUSE Bug 1101557", "url": "https://bugzilla.suse.com/1101557" }, { "category": "self", "summary": "SUSE Bug 1102439", "url": "https://bugzilla.suse.com/1102439" }, { "category": "self", "summary": "SUSE Bug 1102660", "url": "https://bugzilla.suse.com/1102660" }, { "category": "self", "summary": "SUSE Bug 1102875", "url": "https://bugzilla.suse.com/1102875" }, { "category": "self", "summary": "SUSE Bug 1102877", "url": "https://bugzilla.suse.com/1102877" }, { "category": "self", "summary": "SUSE Bug 1102879", "url": "https://bugzilla.suse.com/1102879" }, { "category": "self", "summary": "SUSE Bug 1102882", "url": "https://bugzilla.suse.com/1102882" }, { "category": "self", "summary": "SUSE Bug 1102896", "url": "https://bugzilla.suse.com/1102896" }, { "category": "self", "summary": "SUSE Bug 1103097", "url": "https://bugzilla.suse.com/1103097" }, { "category": "self", "summary": "SUSE Bug 1103156", "url": "https://bugzilla.suse.com/1103156" }, { "category": "self", "summary": "SUSE Bug 1103257", "url": "https://bugzilla.suse.com/1103257" }, { "category": "self", "summary": "SUSE Bug 1103624", "url": "https://bugzilla.suse.com/1103624" }, { "category": "self", "summary": "SUSE Bug 1104098", "url": "https://bugzilla.suse.com/1104098" }, { "category": "self", "summary": "SUSE Bug 1104731", "url": "https://bugzilla.suse.com/1104731" }, { "category": "self", "summary": "SUSE Bug 1105428", "url": "https://bugzilla.suse.com/1105428" }, { "category": "self", "summary": "SUSE Bug 1106061", "url": "https://bugzilla.suse.com/1106061" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106237", "url": "https://bugzilla.suse.com/1106237" }, { "category": "self", "summary": "SUSE Bug 1106240", "url": "https://bugzilla.suse.com/1106240" }, { "category": "self", "summary": "SUSE Bug 1106929", "url": "https://bugzilla.suse.com/1106929" }, { "category": "self", "summary": "SUSE Bug 1107385", "url": "https://bugzilla.suse.com/1107385" }, { "category": "self", "summary": "SUSE Bug 1107866", "url": "https://bugzilla.suse.com/1107866" }, { "category": "self", "summary": "SUSE Bug 1108145", "url": "https://bugzilla.suse.com/1108145" }, { "category": "self", "summary": "SUSE Bug 1108240", "url": "https://bugzilla.suse.com/1108240" }, { "category": "self", "summary": "SUSE Bug 1109272", "url": "https://bugzilla.suse.com/1109272" }, { "category": "self", "summary": "SUSE Bug 1109330", "url": "https://bugzilla.suse.com/1109330" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1109806", "url": "https://bugzilla.suse.com/1109806" }, { "category": "self", "summary": "SUSE Bug 1110286", "url": "https://bugzilla.suse.com/1110286" }, { "category": "self", "summary": "SUSE Bug 1111062", "url": "https://bugzilla.suse.com/1111062" }, { "category": "self", "summary": "SUSE Bug 1111174", "url": "https://bugzilla.suse.com/1111174" }, { "category": "self", "summary": "SUSE Bug 1111809", "url": "https://bugzilla.suse.com/1111809" }, { "category": "self", "summary": "SUSE Bug 1112246", "url": "https://bugzilla.suse.com/1112246" }, { "category": "self", "summary": "SUSE Bug 1112963", "url": "https://bugzilla.suse.com/1112963" }, { "category": "self", "summary": "SUSE Bug 1113412", "url": "https://bugzilla.suse.com/1113412" }, { "category": "self", "summary": "SUSE Bug 1113766", "url": "https://bugzilla.suse.com/1113766" }, { "category": "self", "summary": "SUSE Bug 1114190", "url": "https://bugzilla.suse.com/1114190" }, { "category": "self", "summary": "SUSE Bug 1114417", "url": "https://bugzilla.suse.com/1114417" }, { "category": "self", "summary": "SUSE Bug 1114475", "url": "https://bugzilla.suse.com/1114475" }, { "category": "self", "summary": "SUSE Bug 1114648", "url": "https://bugzilla.suse.com/1114648" }, { "category": "self", "summary": "SUSE Bug 1114763", "url": "https://bugzilla.suse.com/1114763" }, { "category": "self", "summary": "SUSE Bug 1114839", "url": "https://bugzilla.suse.com/1114839" }, { "category": "self", "summary": "SUSE Bug 1114871", "url": "https://bugzilla.suse.com/1114871" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1115431", "url": "https://bugzilla.suse.com/1115431" }, { "category": "self", "summary": "SUSE Bug 1115433", "url": "https://bugzilla.suse.com/1115433" }, { "category": "self", "summary": "SUSE Bug 1115440", "url": "https://bugzilla.suse.com/1115440" }, { "category": "self", "summary": "SUSE Bug 1115482", "url": "https://bugzilla.suse.com/1115482" }, { "category": "self", "summary": "SUSE Bug 1115709", "url": "https://bugzilla.suse.com/1115709" }, { "category": "self", "summary": "SUSE Bug 1116027", "url": "https://bugzilla.suse.com/1116027" }, { "category": "self", "summary": "SUSE Bug 1116183", "url": "https://bugzilla.suse.com/1116183" }, { "category": "self", "summary": "SUSE Bug 1116285", "url": "https://bugzilla.suse.com/1116285" }, { "category": "self", "summary": "SUSE Bug 1116336", "url": "https://bugzilla.suse.com/1116336" }, { "category": "self", "summary": "SUSE Bug 1116345", "url": "https://bugzilla.suse.com/1116345" }, { "category": "self", "summary": "SUSE Bug 1116497", "url": "https://bugzilla.suse.com/1116497" }, { "category": "self", "summary": "SUSE Bug 1116653", "url": "https://bugzilla.suse.com/1116653" }, { "category": "self", "summary": "SUSE Bug 1116841", "url": "https://bugzilla.suse.com/1116841" }, { "category": "self", "summary": "SUSE Bug 1116924", "url": "https://bugzilla.suse.com/1116924" }, { "category": "self", "summary": "SUSE Bug 1116950", "url": "https://bugzilla.suse.com/1116950" }, { "category": "self", "summary": "SUSE Bug 1116962", "url": "https://bugzilla.suse.com/1116962" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117162", "url": "https://bugzilla.suse.com/1117162" }, { "category": "self", "summary": "SUSE Bug 1117165", "url": "https://bugzilla.suse.com/1117165" }, { "category": "self", "summary": "SUSE Bug 1117186", "url": "https://bugzilla.suse.com/1117186" }, { "category": "self", "summary": "SUSE Bug 1117562", "url": "https://bugzilla.suse.com/1117562" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1117744", "url": "https://bugzilla.suse.com/1117744" }, { "category": "self", "summary": "SUSE Bug 1118152", "url": "https://bugzilla.suse.com/1118152" }, { "category": "self", "summary": "SUSE Bug 1118316", "url": "https://bugzilla.suse.com/1118316" }, { "category": "self", "summary": "SUSE Bug 1118319", "url": "https://bugzilla.suse.com/1118319" }, { "category": "self", "summary": "SUSE Bug 1118505", "url": "https://bugzilla.suse.com/1118505" }, { "category": "self", "summary": "SUSE Bug 1118790", "url": "https://bugzilla.suse.com/1118790" }, { "category": "self", "summary": "SUSE Bug 1118798", "url": "https://bugzilla.suse.com/1118798" }, { "category": "self", "summary": "SUSE Bug 1118915", "url": "https://bugzilla.suse.com/1118915" }, { "category": "self", "summary": "SUSE Bug 1118922", "url": "https://bugzilla.suse.com/1118922" }, { "category": "self", "summary": "SUSE Bug 1118926", "url": "https://bugzilla.suse.com/1118926" }, { "category": "self", "summary": "SUSE Bug 1118930", "url": "https://bugzilla.suse.com/1118930" }, { "category": "self", "summary": "SUSE Bug 1118936", "url": "https://bugzilla.suse.com/1118936" }, { "category": "self", "summary": "SUSE Bug 1119204", "url": "https://bugzilla.suse.com/1119204" }, { "category": "self", "summary": "SUSE Bug 1119680", "url": "https://bugzilla.suse.com/1119680" }, { "category": "self", "summary": "SUSE Bug 1119714", "url": "https://bugzilla.suse.com/1119714" }, { "category": "self", "summary": "SUSE Bug 1119877", "url": "https://bugzilla.suse.com/1119877" }, { "category": "self", "summary": "SUSE Bug 1119946", "url": "https://bugzilla.suse.com/1119946" }, { "category": "self", "summary": "SUSE Bug 1119967", "url": "https://bugzilla.suse.com/1119967" }, { "category": "self", "summary": "SUSE Bug 1119970", "url": "https://bugzilla.suse.com/1119970" }, { "category": "self", "summary": "SUSE Bug 1120017", "url": "https://bugzilla.suse.com/1120017" }, { "category": "self", "summary": "SUSE Bug 1120046", "url": "https://bugzilla.suse.com/1120046" }, { "category": "self", "summary": "SUSE Bug 1120722", "url": "https://bugzilla.suse.com/1120722" }, { "category": "self", "summary": "SUSE Bug 1120743", "url": "https://bugzilla.suse.com/1120743" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1120950", "url": "https://bugzilla.suse.com/1120950" }, { "category": "self", "summary": "SUSE Bug 1121239", "url": "https://bugzilla.suse.com/1121239" }, { "category": "self", "summary": "SUSE Bug 1121240", "url": "https://bugzilla.suse.com/1121240" }, { "category": "self", "summary": "SUSE Bug 1121241", "url": "https://bugzilla.suse.com/1121241" }, { "category": "self", "summary": "SUSE Bug 1121242", "url": "https://bugzilla.suse.com/1121242" }, { "category": "self", "summary": "SUSE Bug 1121275", "url": "https://bugzilla.suse.com/1121275" }, { "category": "self", "summary": "SUSE Bug 1121621", "url": "https://bugzilla.suse.com/1121621" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1122650", "url": "https://bugzilla.suse.com/1122650" }, { "category": "self", "summary": "SUSE Bug 1122651", "url": "https://bugzilla.suse.com/1122651" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1123321", "url": "https://bugzilla.suse.com/1123321" }, { "category": "self", "summary": "SUSE Bug 1123323", "url": "https://bugzilla.suse.com/1123323" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE Bug 1123933", "url": "https://bugzilla.suse.com/1123933" }, { "category": "self", "summary": "SUSE Bug 1124166", "url": "https://bugzilla.suse.com/1124166" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1124775", "url": "https://bugzilla.suse.com/1124775" }, { "category": "self", "summary": "SUSE Bug 1124777", "url": "https://bugzilla.suse.com/1124777" }, { "category": "self", "summary": "SUSE Bug 1124780", "url": "https://bugzilla.suse.com/1124780" }, { "category": "self", "summary": "SUSE Bug 1124811", "url": "https://bugzilla.suse.com/1124811" }, { "category": "self", "summary": "SUSE Bug 1125000", "url": "https://bugzilla.suse.com/1125000" }, { "category": "self", "summary": "SUSE Bug 1125014", "url": "https://bugzilla.suse.com/1125014" }, { "category": "self", "summary": "SUSE Bug 1125446", "url": "https://bugzilla.suse.com/1125446" }, { "category": "self", "summary": "SUSE Bug 1125794", "url": "https://bugzilla.suse.com/1125794" }, { "category": "self", "summary": "SUSE Bug 1125796", "url": "https://bugzilla.suse.com/1125796" }, { "category": "self", "summary": "SUSE Bug 1125808", "url": "https://bugzilla.suse.com/1125808" }, { "category": "self", "summary": "SUSE Bug 1125809", "url": "https://bugzilla.suse.com/1125809" }, { "category": "self", "summary": "SUSE Bug 1125810", "url": "https://bugzilla.suse.com/1125810" }, { "category": "self", "summary": "SUSE Bug 1125892", "url": "https://bugzilla.suse.com/1125892" }, { "category": "self", "summary": "SUSE Bug 985031", "url": "https://bugzilla.suse.com/985031" }, { "category": "self", "summary": "SUSE CVE CVE-2018-1120 page", "url": "https://www.suse.com/security/cve/CVE-2018-1120/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16862 page", "url": "https://www.suse.com/security/cve/CVE-2018-16862/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16884 page", "url": "https://www.suse.com/security/cve/CVE-2018-16884/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19407 page", "url": "https://www.suse.com/security/cve/CVE-2018-19407/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19824 page", "url": "https://www.suse.com/security/cve/CVE-2018-19824/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19985 page", "url": "https://www.suse.com/security/cve/CVE-2018-19985/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20169 page", "url": "https://www.suse.com/security/cve/CVE-2018-20169/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5391 page", "url": "https://www.suse.com/security/cve/CVE-2018-5391/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-9568 page", "url": "https://www.suse.com/security/cve/CVE-2018-9568/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-03-04T16:45:36Z", "generator": { "date": "2019-03-04T16:45:36Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0541-1", "initial_release_date": "2019-03-04T16:45:36Z", "revision_history": [ { "date": "2019-03-04T16:45:36Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.175-94.79.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.175-94.79.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.175-94.79.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.175-94.79.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.175-94.79.1.aarch64", "product_id": "dlm-kmp-default-4.4.175-94.79.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.175-94.79.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.175-94.79.1.aarch64", "product_id": "gfs2-kmp-default-4.4.175-94.79.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.175-94.79.1.aarch64", "product": { "name": "kernel-default-4.4.175-94.79.1.aarch64", "product_id": "kernel-default-4.4.175-94.79.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.175-94.79.1.aarch64", "product": { "name": "kernel-default-base-4.4.175-94.79.1.aarch64", "product_id": "kernel-default-base-4.4.175-94.79.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.175-94.79.1.aarch64", "product": { "name": "kernel-default-devel-4.4.175-94.79.1.aarch64", "product_id": "kernel-default-devel-4.4.175-94.79.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.175-94.79.1.aarch64", "product": { "name": "kernel-default-extra-4.4.175-94.79.1.aarch64", "product_id": "kernel-default-extra-4.4.175-94.79.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.175-94.79.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.175-94.79.1.aarch64", "product_id": "kernel-default-kgraft-4.4.175-94.79.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.175-94.79.1.aarch64", "product": { "name": "kernel-obs-build-4.4.175-94.79.1.aarch64", "product_id": "kernel-obs-build-4.4.175-94.79.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.175-94.79.2.aarch64", "product": { "name": "kernel-obs-qa-4.4.175-94.79.2.aarch64", "product_id": "kernel-obs-qa-4.4.175-94.79.2.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.175-94.79.1.aarch64", "product": { "name": "kernel-syms-4.4.175-94.79.1.aarch64", "product_id": "kernel-syms-4.4.175-94.79.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.175-94.79.1.aarch64", "product": { "name": "kernel-vanilla-4.4.175-94.79.1.aarch64", "product_id": "kernel-vanilla-4.4.175-94.79.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.175-94.79.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.175-94.79.1.aarch64", "product_id": "kernel-vanilla-base-4.4.175-94.79.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.175-94.79.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.175-94.79.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.175-94.79.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.175-94.79.1.aarch64", "product": { "name": "kselftests-kmp-default-4.4.175-94.79.1.aarch64", "product_id": "kselftests-kmp-default-4.4.175-94.79.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.175-94.79.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.175-94.79.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.175-94.79.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.175-94.79.1.noarch", "product": { "name": "kernel-devel-4.4.175-94.79.1.noarch", "product_id": "kernel-devel-4.4.175-94.79.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.175-94.79.1.noarch", "product": { "name": "kernel-docs-4.4.175-94.79.1.noarch", "product_id": "kernel-docs-4.4.175-94.79.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.175-94.79.1.noarch", "product": { "name": "kernel-docs-html-4.4.175-94.79.1.noarch", "product_id": "kernel-docs-html-4.4.175-94.79.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.175-94.79.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.175-94.79.1.noarch", "product_id": "kernel-docs-pdf-4.4.175-94.79.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.175-94.79.1.noarch", "product": { "name": "kernel-macros-4.4.175-94.79.1.noarch", "product_id": "kernel-macros-4.4.175-94.79.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.175-94.79.1.noarch", "product": { "name": "kernel-source-4.4.175-94.79.1.noarch", "product_id": "kernel-source-4.4.175-94.79.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.175-94.79.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.175-94.79.1.noarch", "product_id": "kernel-source-vanilla-4.4.175-94.79.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.175-94.79.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.175-94.79.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.175-94.79.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.175-94.79.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.175-94.79.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.175-94.79.1.ppc64le", "product_id": "dlm-kmp-default-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.175-94.79.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.175-94.79.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.175-94.79.1.ppc64le", "product": { "name": "kernel-debug-4.4.175-94.79.1.ppc64le", "product_id": "kernel-debug-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.175-94.79.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.175-94.79.1.ppc64le", "product_id": "kernel-debug-base-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.175-94.79.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.175-94.79.1.ppc64le", "product_id": "kernel-debug-devel-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.175-94.79.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.175-94.79.1.ppc64le", "product_id": "kernel-debug-extra-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.175-94.79.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.175-94.79.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.175-94.79.1.ppc64le", "product": { "name": "kernel-default-4.4.175-94.79.1.ppc64le", "product_id": "kernel-default-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.175-94.79.1.ppc64le", "product": { "name": "kernel-default-base-4.4.175-94.79.1.ppc64le", "product_id": "kernel-default-base-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.175-94.79.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.175-94.79.1.ppc64le", "product_id": "kernel-default-devel-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.175-94.79.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.175-94.79.1.ppc64le", "product_id": "kernel-default-extra-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.175-94.79.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.175-94.79.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.175-94.79.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.175-94.79.1.ppc64le", "product_id": "kernel-obs-build-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.175-94.79.2.ppc64le", "product": { "name": "kernel-obs-qa-4.4.175-94.79.2.ppc64le", "product_id": "kernel-obs-qa-4.4.175-94.79.2.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.175-94.79.1.ppc64le", "product": { "name": "kernel-syms-4.4.175-94.79.1.ppc64le", "product_id": "kernel-syms-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.175-94.79.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.175-94.79.1.ppc64le", "product_id": "kernel-vanilla-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.175-94.79.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.175-94.79.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.175-94.79.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.175-94.79.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "product": { "name": "kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "product_id": "kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.175-94.79.1.ppc64le", "product": { "name": "kselftests-kmp-debug-4.4.175-94.79.1.ppc64le", "product_id": "kselftests-kmp-debug-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.175-94.79.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.4.175-94.79.1.ppc64le", "product_id": "kselftests-kmp-default-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.175-94.79.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.175-94.79.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.175-94.79.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.175-94.79.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.175-94.79.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.175-94.79.1.s390x", "product_id": "cluster-md-kmp-default-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.175-94.79.1.s390x", "product": { "name": "dlm-kmp-default-4.4.175-94.79.1.s390x", "product_id": "dlm-kmp-default-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.175-94.79.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.175-94.79.1.s390x", "product_id": "gfs2-kmp-default-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.175-94.79.1.s390x", "product": { "name": "kernel-default-4.4.175-94.79.1.s390x", "product_id": "kernel-default-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.175-94.79.1.s390x", "product": { "name": "kernel-default-base-4.4.175-94.79.1.s390x", "product_id": "kernel-default-base-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.175-94.79.1.s390x", "product": { "name": "kernel-default-devel-4.4.175-94.79.1.s390x", "product_id": "kernel-default-devel-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.175-94.79.1.s390x", "product": { "name": "kernel-default-extra-4.4.175-94.79.1.s390x", "product_id": "kernel-default-extra-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.175-94.79.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.175-94.79.1.s390x", "product_id": "kernel-default-kgraft-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.175-94.79.1.s390x", "product": { "name": "kernel-default-man-4.4.175-94.79.1.s390x", "product_id": "kernel-default-man-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.175-94.79.1.s390x", "product": { "name": "kernel-obs-build-4.4.175-94.79.1.s390x", "product_id": "kernel-obs-build-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.175-94.79.2.s390x", "product": { "name": "kernel-obs-qa-4.4.175-94.79.2.s390x", "product_id": "kernel-obs-qa-4.4.175-94.79.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.175-94.79.1.s390x", "product": { "name": "kernel-syms-4.4.175-94.79.1.s390x", "product_id": "kernel-syms-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.175-94.79.1.s390x", "product": { "name": "kernel-vanilla-4.4.175-94.79.1.s390x", "product_id": "kernel-vanilla-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.175-94.79.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.175-94.79.1.s390x", "product_id": "kernel-vanilla-base-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.175-94.79.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.175-94.79.1.s390x", "product_id": "kernel-vanilla-devel-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.175-94.79.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.175-94.79.1.s390x", "product_id": "kernel-zfcpdump-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.175-94.79.1.s390x", "product": { "name": "kselftests-kmp-default-4.4.175-94.79.1.s390x", "product_id": "kselftests-kmp-default-4.4.175-94.79.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.175-94.79.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.175-94.79.1.s390x", "product_id": "ocfs2-kmp-default-4.4.175-94.79.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.175-94.79.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.175-94.79.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.175-94.79.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.175-94.79.1.x86_64", "product_id": "dlm-kmp-debug-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.175-94.79.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.175-94.79.1.x86_64", "product_id": "dlm-kmp-default-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.175-94.79.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.175-94.79.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.175-94.79.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.175-94.79.1.x86_64", "product_id": "gfs2-kmp-default-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.175-94.79.1.x86_64", "product": { "name": "kernel-debug-4.4.175-94.79.1.x86_64", "product_id": "kernel-debug-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.175-94.79.1.x86_64", "product": { "name": "kernel-debug-base-4.4.175-94.79.1.x86_64", "product_id": "kernel-debug-base-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.175-94.79.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.175-94.79.1.x86_64", "product_id": "kernel-debug-devel-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.175-94.79.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.175-94.79.1.x86_64", "product_id": "kernel-debug-extra-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.175-94.79.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.175-94.79.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.175-94.79.1.x86_64", "product": { "name": "kernel-default-4.4.175-94.79.1.x86_64", "product_id": "kernel-default-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.175-94.79.1.x86_64", "product": { "name": "kernel-default-base-4.4.175-94.79.1.x86_64", "product_id": "kernel-default-base-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.175-94.79.1.x86_64", "product": { "name": "kernel-default-devel-4.4.175-94.79.1.x86_64", "product_id": "kernel-default-devel-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.175-94.79.1.x86_64", "product": { "name": "kernel-default-extra-4.4.175-94.79.1.x86_64", "product_id": "kernel-default-extra-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.175-94.79.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.175-94.79.1.x86_64", "product_id": "kernel-default-kgraft-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.175-94.79.1.x86_64", "product": { "name": "kernel-obs-build-4.4.175-94.79.1.x86_64", "product_id": "kernel-obs-build-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.175-94.79.2.x86_64", "product": { "name": "kernel-obs-qa-4.4.175-94.79.2.x86_64", "product_id": "kernel-obs-qa-4.4.175-94.79.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.175-94.79.1.x86_64", "product": { "name": "kernel-syms-4.4.175-94.79.1.x86_64", "product_id": "kernel-syms-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.175-94.79.1.x86_64", "product": { "name": "kernel-vanilla-4.4.175-94.79.1.x86_64", "product_id": "kernel-vanilla-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.175-94.79.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.175-94.79.1.x86_64", "product_id": "kernel-vanilla-base-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.175-94.79.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.175-94.79.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "product": { "name": "kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "product_id": "kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.4.175-94.79.1.x86_64", "product": { "name": "kselftests-kmp-debug-4.4.175-94.79.1.x86_64", "product_id": "kselftests-kmp-debug-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.4.175-94.79.1.x86_64", "product": { "name": "kselftests-kmp-default-4.4.175-94.79.1.x86_64", "product_id": "kselftests-kmp-default-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.175-94.79.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.175-94.79.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.175-94.79.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.175-94.79.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64" }, "product_reference": "kernel-default-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" }, "product_reference": "kernel-default-extra-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.175-94.79.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch" }, "product_reference": "kernel-devel-4.4.175-94.79.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.175-94.79.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch" }, "product_reference": "kernel-macros-4.4.175-94.79.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.175-94.79.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch" }, "product_reference": "kernel-source-4.4.175-94.79.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3", "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64" }, "product_reference": "kernel-syms-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.175-94.79.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.175-94.79.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.175-94.79.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.175-94.79.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.175-94.79.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.175-94.79.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.175-94.79.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.175-94.79.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.175-94.79.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.175-94.79.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.175-94.79.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.175-94.79.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.175-94.79.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3", "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64" }, "product_reference": "kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.4.175-94.79.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch" }, "product_reference": "kernel-docs-4.4.175-94.79.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.175-94.79.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64" }, "product_reference": "kernel-obs-build-4.4.175-94.79.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.175-94.79.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le" }, "product_reference": "kernel-obs-build-4.4.175-94.79.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.175-94.79.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x" }, "product_reference": "kernel-obs-build-4.4.175-94.79.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64" }, "product_reference": "kernel-obs-build-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.175-94.79.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64" }, "product_reference": "kernel-default-4.4.175-94.79.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.175-94.79.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le" }, "product_reference": "kernel-default-4.4.175-94.79.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.175-94.79.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x" }, "product_reference": "kernel-default-4.4.175-94.79.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64" }, "product_reference": "kernel-default-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.175-94.79.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64" }, "product_reference": "kernel-default-base-4.4.175-94.79.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.175-94.79.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.175-94.79.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.175-94.79.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x" }, "product_reference": "kernel-default-base-4.4.175-94.79.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64" }, "product_reference": "kernel-default-base-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.175-94.79.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.175-94.79.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.175-94.79.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.175-94.79.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.175-94.79.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x" }, "product_reference": "kernel-default-devel-4.4.175-94.79.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.175-94.79.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x" }, "product_reference": "kernel-default-man-4.4.175-94.79.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.175-94.79.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch" }, "product_reference": "kernel-devel-4.4.175-94.79.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.175-94.79.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch" }, "product_reference": "kernel-macros-4.4.175-94.79.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.175-94.79.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch" }, "product_reference": "kernel-source-4.4.175-94.79.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.175-94.79.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64" }, "product_reference": "kernel-syms-4.4.175-94.79.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.175-94.79.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le" }, "product_reference": "kernel-syms-4.4.175-94.79.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.175-94.79.1.s390x as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x" }, "product_reference": "kernel-syms-4.4.175-94.79.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64" }, "product_reference": "kernel-syms-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.175-94.79.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64" }, "product_reference": "kernel-default-4.4.175-94.79.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.175-94.79.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le" }, "product_reference": "kernel-default-4.4.175-94.79.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.175-94.79.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x" }, "product_reference": "kernel-default-4.4.175-94.79.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64" }, "product_reference": "kernel-default-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.175-94.79.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64" }, "product_reference": "kernel-default-base-4.4.175-94.79.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.175-94.79.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.175-94.79.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.175-94.79.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x" }, "product_reference": "kernel-default-base-4.4.175-94.79.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64" }, "product_reference": "kernel-default-base-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.175-94.79.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64" }, "product_reference": "kernel-default-devel-4.4.175-94.79.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.175-94.79.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.175-94.79.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.175-94.79.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x" }, "product_reference": "kernel-default-devel-4.4.175-94.79.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.175-94.79.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x" }, "product_reference": "kernel-default-man-4.4.175-94.79.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.175-94.79.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch" }, "product_reference": "kernel-devel-4.4.175-94.79.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.175-94.79.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch" }, "product_reference": "kernel-macros-4.4.175-94.79.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.175-94.79.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch" }, "product_reference": "kernel-source-4.4.175-94.79.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.175-94.79.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64" }, "product_reference": "kernel-syms-4.4.175-94.79.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.175-94.79.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le" }, "product_reference": "kernel-syms-4.4.175-94.79.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.175-94.79.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x" }, "product_reference": "kernel-syms-4.4.175-94.79.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64" }, "product_reference": "kernel-syms-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.4.175-94.79.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" }, "product_reference": "kernel-default-extra-4.4.175-94.79.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-1120", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-1120" } ], "notes": [ { "category": "general", "text": "A flaw was found affecting the Linux kernel before version 4.17. By mmap()ing a FUSE-backed file onto a process\u0027s memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/\u003cpid\u003e/cmdline (or /proc/\u003cpid\u003e/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-1120", "url": "https://www.suse.com/security/cve/CVE-2018-1120" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-1120", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1092100 for CVE-2018-1120", "url": "https://bugzilla.suse.com/1092100" }, { "category": "external", "summary": "SUSE Bug 1093158 for CVE-2018-1120", "url": "https://bugzilla.suse.com/1093158" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-04T16:45:36Z", "details": "low" } ], "title": "CVE-2018-1120" }, { "cve": "CVE-2018-16862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16862" } ], "notes": [ { "category": "general", "text": "A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16862", "url": "https://www.suse.com/security/cve/CVE-2018-16862" }, { "category": "external", "summary": "SUSE Bug 1117186 for CVE-2018-16862", "url": "https://bugzilla.suse.com/1117186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-04T16:45:36Z", "details": "moderate" } ], "title": "CVE-2018-16862" }, { "cve": "CVE-2018-16884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16884" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16884", "url": "https://www.suse.com/security/cve/CVE-2018-16884" }, { "category": "external", "summary": "SUSE Bug 1119946 for CVE-2018-16884", "url": "https://bugzilla.suse.com/1119946" }, { "category": "external", "summary": "SUSE Bug 1119947 for CVE-2018-16884", "url": "https://bugzilla.suse.com/1119947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-04T16:45:36Z", "details": "important" } ], "title": "CVE-2018-16884" }, { "cve": "CVE-2018-19407", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19407" } ], "notes": [ { "category": "general", "text": "The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19407", "url": "https://www.suse.com/security/cve/CVE-2018-19407" }, { "category": "external", "summary": "SUSE Bug 1116841 for CVE-2018-19407", "url": "https://bugzilla.suse.com/1116841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-04T16:45:36Z", "details": "moderate" } ], "title": "CVE-2018-19407" }, { "cve": "CVE-2018-19824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19824" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19824", "url": "https://www.suse.com/security/cve/CVE-2018-19824" }, { "category": "external", "summary": "SUSE Bug 1118152 for CVE-2018-19824", "url": "https://bugzilla.suse.com/1118152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-04T16:45:36Z", "details": "moderate" } ], "title": "CVE-2018-19824" }, { "cve": "CVE-2018-19985", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19985" } ], "notes": [ { "category": "general", "text": "The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19985", "url": "https://www.suse.com/security/cve/CVE-2018-19985" }, { "category": "external", "summary": "SUSE Bug 1120743 for CVE-2018-19985", "url": "https://bugzilla.suse.com/1120743" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-04T16:45:36Z", "details": "low" } ], "title": "CVE-2018-19985" }, { "cve": "CVE-2018-20169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20169" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20169", "url": "https://www.suse.com/security/cve/CVE-2018-20169" }, { "category": "external", "summary": "SUSE Bug 1119714 for CVE-2018-20169", "url": "https://bugzilla.suse.com/1119714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-04T16:45:36Z", "details": "moderate" } ], "title": "CVE-2018-20169" }, { "cve": "CVE-2018-5391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5391" } ], "notes": [ { "category": "general", "text": "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5391", "url": "https://www.suse.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1108654 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1108654" }, { "category": "external", "summary": "SUSE Bug 1114071 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1114071" }, { "category": "external", "summary": "SUSE Bug 1121102 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1121102" }, { "category": "external", "summary": "SUSE Bug 1134140 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1134140" }, { "category": "external", "summary": "SUSE Bug 1181460 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1181460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-04T16:45:36Z", "details": "important" } ], "title": "CVE-2018-5391" }, { "cve": "CVE-2018-9568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-9568" } ], "notes": [ { "category": "general", "text": "In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-9568", "url": "https://www.suse.com/security/cve/CVE-2018-9568" }, { "category": "external", "summary": "SUSE Bug 1118319 for CVE-2018-9568", "url": "https://bugzilla.suse.com/1118319" }, { "category": "external", "summary": "SUSE Bug 1118320 for CVE-2018-9568", "url": "https://bugzilla.suse.com/1118320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-04T16:45:36Z", "details": "important" } ], "title": "CVE-2018-9568" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-04T16:45:36Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-04T16:45:36Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-04T16:45:36Z", "details": "important" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-04T16:45:36Z", "details": "important" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_175-94_79-default-1-4.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.175-94.79.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.175-94.79.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.175-94.79.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-04T16:45:36Z", "details": "low" } ], "title": "CVE-2019-7222" } ] }
suse-su-2019:0767-1
Vulnerability from csaf_suse
Published
2019-03-27 09:34
Modified
2019-03-27 09:34
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise Server 12 SP4 Azure kernel was updated to fix various issues.
The following security bugs were fixed:
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166 1128378 1129016).
- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).
- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') can cause a system lock up and a denial of service. (bnc#1123161).
- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglected to set a NULL value for a certain structure member, which led to a use-after-free in sockfs_setattr (bnc#1125907 1126284).
- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).
- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).
- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).
- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host's stack memory contents to a guest (bsc#1124735).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).
- CVE-2018-20669: An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c where a local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation (bnc#1122971).
The following non-security bugs were fixed:
- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).
- 9p: clear dangling pointers in p9stat_free (bsc#1051510).
- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).
- 9p/net: fix memory leak in p9_client_create (bsc#1051510).
- 9p/net: put a lower bound on msize (bsc#1051510).
- 9p: use inode->i_lock to protect i_size_write() under 32-bit (bsc#1051510).
- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).
- acpi / device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).
- acpi/nfit: Block function zero DSMs (bsc#1051510).
- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).
- acpi/nfit: Fix bus command validation (bsc#1051510).
- acpi/nfit: Fix command-supported detection (bsc#1051510).
- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).
- acpi/nfit: Fix user-initiated ARS to be 'ARS-long' rather than 'ARS-short' (bsc#1124969).
- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).
- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).
- acpi / video: Extend chassis-type detection with a 'Lunch Box' check (bsc#1051510).
- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).
- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705
- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).
- add mainline tags for two hyperv iommu patches
- Adjust a commit id in a nvme patch to make our scripts happy
- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).
- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).
- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).
- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).
- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).
- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).
- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).
- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).
- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).
- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).
- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).
- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).
- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).
- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).
- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).
- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).
- alsa: hda - Serialize codec registrations (bsc#1122944).
- alsa: hda - Use standard device registration for beep (bsc#1122944).
- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).
- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).
- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).
- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).
- altera-stapl: check for a null key before strcasecmp'ing it (bsc#1051510).
- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).
- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).
- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).
- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).
- arm64: fault: avoid send SIGBUS two times (bsc#1126393).
- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).
- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).
- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).
- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).
- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).
- arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).
- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).
- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).
- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).
- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).
- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).
- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).
- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).
- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).
- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).
- arm: pxa: avoid section mismatch warning (bsc#1051510).
- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).
- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).
- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).
- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).
- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).
- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).
- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).
- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).
- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).
- assoc_array: Fix shortcut creation (bsc#1051510).
- ata: ahci: mvebu: remove stale comment (bsc#1051510).
- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).
- ath9k: dynack: check da->enabled first in sampling routines (bsc#1051510).
- ath9k: dynack: make ewma estimation faster (bsc#1051510).
- ath9k: dynack: use authentication messages for 'late' ack (bsc#1051510).
- atm: he: fix sign-extension overflow on large shift (bsc#1051510).
- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).
- ax25: fix possible use-after-free (bsc#1051510).
- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)
- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).
- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).
- batman-adv: Force mac header to start of data on xmit (bsc#1051510).
- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).
- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).
- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).
- blk-mq: fix a hung issue when fsync (bsc#1125252).
- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).
- block: break discard submissions into the user defined size (git-fixes).
- block: cleanup __blkdev_issue_discard() (git-fixes).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).
- blockdev: Fix livelocks on loop device (bsc#1124984).
- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).
- block: do not use bio->bi_vcnt to figure out segment number (bsc#1128895).
- block: do not warn when doing fsync on read-only devices (bsc#1125252).
- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).
- block: fix infinite loop if the device loses discard capability (git-fixes).
- block/loop: Use global lock for ioctl() operation (bsc#1124974).
- block: make sure discard bio is aligned with logical block size (git-fixes).
- block: make sure writesame bio is aligned with logical block size (git-fixes).
- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).
- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).
- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).
- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).
- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).
- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).
- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).
- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).
- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282 ).
- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).
- bonding: update nest level on unlink (git-fixes).
- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).
- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).
- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1083647).
- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).
- bpf: Fix syscall's stackmap lookup potential deadlock (bsc#1083647).
- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).
- bpf/verifier: fix verifier instability (bsc#1056787).
- bsg: allocate sense buffer if requested (bsc#1106811).
- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).
- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).
- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).
- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).
- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).
- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).
- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).
- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).
- btrfs: fix fsync after succession of renames of different files (bsc#1126481).
- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).
- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).
- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).
- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).
- btrfs: Improve btrfs_search_slot description (bsc#1126802).
- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1063638).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).
- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).
- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).
- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1063638).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).
- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).
- btrfs: remove always true check in unlock_up (bsc#1126802).
- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).
- btrfs: remove unnecessary level check in balance_level (bsc#1126802).
- btrfs: remove unused check of skip_locking (bsc#1126802).
- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).
- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).
- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).
- btrfs: split btrfs_extent_same (bsc#1127493).
- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).
- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).
- can: bcm: check timer values before ktime conversion (bsc#1051510).
- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).
- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).
- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).
- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).
- ceph: avoid repeatedly adding inode to mdsc->snap_flush_list (bsc#1126790).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).
- cfg80211: extend range deviation for DMG (bsc#1051510).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).
- checkstack.pl: fix for aarch64 (bsc#1051510).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- cifs: add missing debug entries for kconfig options (bsc#1051510).
- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510).
- cifs: add sha512 secmech (bsc#1051510).
- cifs: Add support for reading attributes on SMB2+ (bsc#1051510).
- cifs: Add support for writing attributes on SMB2+ (bsc#1051510).
- cifs: Always resolve hostname before reconnecting (bsc#1051510).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).
- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).
- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).
- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510).
- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).
- cifs: Fix NULL pointer dereference of devname (bnc#1129519).
- cifs: fix return value for cifs_listxattr (bsc#1051510).
- cifs: Fix separator when building path from dentry (bsc#1051510).
- cifs: fix set info (bsc#1051510).
- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).
- cifs: fix wrapping bugs in num_entries() (bsc#1051510).
- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: implement v3.11 preauth integrity (bsc#1051510).
- cifs: invalidate cache when we truncate a file (bsc#1051510).
- cifs: make 'nodfs' mount opt a superblock flag (bsc#1051510).
- cifs: OFD locks do not conflict with eachothers (bsc#1051510).
- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).
- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: refactor crypto shash/sdesc allocation&free (bsc#1051510).
- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).
- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).
- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).
- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).
- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).
- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).
- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).
- clk: imx6q: reset exclusive gates on init (bsc#1051510).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).
- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).
- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).
- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).
- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).
- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).
- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).
- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).
- clk: socfpga: fix refcount leak (bsc#1051510).
- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).
- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).
- clk: sunxi-ng: enable so-said LDOs for A64 SoC's pll-mipi clock (bsc#1051510).
- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).
- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).
- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).
- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).
- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).
- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).
- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).
- configfs: fix registered group removal (bsc#1051510).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).
- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).
- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).
- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).
- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).
- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).
- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).
- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).
- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).
- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).
- crypto: ahash - fix another early termination in hash walk (bsc#1051510).
- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).
- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).
- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).
- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).
- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).
- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).
- crypto: caam - fixed handling of sg list (bsc#1051510).
- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).
- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).
- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).
- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).
- crypto: hash - set CRYPTO_TFM_NEED_KEY if ->setkey() fails (bsc#1051510).
- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).
- crypto: tgr192 - fix unaligned memory access (bsc#1051510).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).
- cw1200: drop useless LIST_HEAD (bsc#1051510).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).
- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).
- debugfs: fix debugfs_rename parameter checking (bsc#1051510).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).
- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).
- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).
- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).
- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).
- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).
- dmaengine: at_hdmac: fix module unloading (bsc#1051510).
- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).
- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).
- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).
- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).
- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).
- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).
- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).
- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).
- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).
- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).
- dma: Introduce dma_max_mapping_size() (bsc#1120008).
- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).
- dm: call blk_queue_split() to impose device limits on bios (git-fixes).
- dm: do not allow readahead to limit IO size (git-fixes).
- dm thin: send event about thin-pool state change _after_ making it (git-fixes).
- dm zoned: Fix target BIO completion handling (git-fixes).
- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).
- doc/README.SUSE: Correct description for building a kernel (bsc#1123348)
- Do not log confusing message on reconnect by default (bsc#1129664).
- Do not log expected error on DFS referral request (bsc#1051510).
- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).
- driver core: Move async_synchronize_full call (bsc#1051510).
- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).
- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: Remove the useless API vmbus_get_outgoing_channel() (bsc#1127577).
- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).
- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).
- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).
- drivers/sbus/char: add of_node_put() (bsc#1051510).
- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).
- drm/ast: Fix connector leak during driver unload (bsc#1051510).
- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).
- drm/atomic-helper: Complete fake_commit->flip_done potentially earlier (bsc#1051510).
- drm: Block fb changes for async plane updates (bsc#1051510).
- drm/bridge: tc358767: add defines for DP1_SRCCTRL & PHY_2LANE (bsc#1051510).
- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).
- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).
- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).
- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).
- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).
- drm: Clear state->acquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).
- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).
- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)
- drm/etnaviv: potential NULL dereference (bsc#1113722)
- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)
- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)
- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)
- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)
- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)
- drm/i915/gvt: Fix mmap range check (bsc#1120902)
- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)
- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).
- drm/i915/opregion: fix version check (bsc#1113722)
- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)
- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).
- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)
- drm/meson: add missing of_node_put (bsc#1051510).
- drm/modes: Prevent division by zero htotal (bsc#1051510).
- drm/msm: Fix error return checking (bsc#1051510).
- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).
- drm/msm: Unblock writer if reader closes file (bsc#1051510).
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)
- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).
- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)
- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)
- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)
- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).
- drm/rockchip: fix for mailbox read size (bsc#1051510).
- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)
- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).
- drm/vmwgfx: Do not double-free the mode stored in par->set_mode (bsc#1103429)
- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)
- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)
- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).
- earlycon: Initialize port->uartclk based on clock-frequency property (bsc#1051510).
- earlycon: Remove hardcoded port->uartclk initialization in of_setup_earlycon (bsc#1051510).
- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)
- Enable livepatch test drivers in lib/ Livepatch kselftests need those.
- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).
- enic: fix checksum validation for IPv6 (bsc#1051510).
- esp6: fix memleak on error path in esp6_input (bsc#1051510).
- esp: Fix locking on page fragment allocation (bsc#1051510).
- esp: Fix memleaks on error paths (bsc#1051510).
- esp: Fix skb tailroom calculation (bsc#1051510).
- exportfs: do not read dentry after free (bsc#1051510).
- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).
- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).
- ext4: Fix crash during online resizing (bsc#1122779).
- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).
- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).
- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).
- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).
- fat: validate ->i_start before using (bsc#1051510).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1113722)
- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).
- Fix kabi issues with new transport sharing code (bsc#1114893).
- Fix problem with sharetransport= and NFSv4 (bsc#1114893).
- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).
- floppy: check_events callback should not return a negative number (bsc#1051510).
- fork: do not copy inconsistent signal handler state to child (bsc#1051510).
- fork: record start_time late (git-fixes).
- fork: unconditionally clear stack on fork (git-fixes).
- fs/cifs: require sha512 (bsc#1051510).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).
- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).
- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).
- fuse: handle zero sized retrieve correctly (bsc#1051510).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bsc#1051510).
- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).
- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).
- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).
- geneve, vxlan: Do not set exceptions if skb->len < mtu (bsc#1123456).
- genwqe: Fix size check (bsc#1051510).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bsc#1120601).
- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).
- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).
- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).
- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).
- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).
- gpio: pl061: handle failed allocations (bsc#1051510).
- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).
- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)
- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).
- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).
- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).
- hfs: do not free node before using (bsc#1051510).
- hfsplus: do not free node before using (bsc#1051510).
- hfsplus: prevent btree data loss on root split (bsc#1051510).
- hfs: prevent btree data loss on root split (bsc#1051510).
- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).
- hpet: Fix missing '=' character in the __setup() code of hpet_mmap_enable (git-fixes).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).
- hv_uio_generic: map ringbuffer phys addr (bsc#1127577).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- hwmon/k10temp: Add support for AMD family 17h, model 30h CPUs ().
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).
- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).
- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).
- hyperv/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).
- i2c-axxia: check for error conditions first (bsc#1051510).
- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).
- i2c: cadence: Fix the hold bit setting (bsc#1051510).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).
- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).
- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).
- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).
- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).
- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).
- ib/core: Destroy QP if XRC QP fails (bsc#1046306).
- ib/core: Fix potential memory leak while creating MAD agents (bsc#1046306).
- ib/core: Unregister notifier before freeing MAD security (bsc#1046306).
- ib/hfi1: Close race condition on user context disable and close (bsc#1060463).
- ib/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- ide: pmac: add of_node_put() (bsc#1051510).
- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).
- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).
- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).
- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).
- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).
- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).
- input: bma150 - register input device after setting private data (bsc#1051510).
- input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).
- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).
- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).
- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).
- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).
- input: raspberrypi-ts - fix link error (git-fixes).
- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).
- input: restore EV_ABS ABS_RESERVED (bsc#1051510).
- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).
- input: synaptics - enable SMBus for HP EliteBook 840 G4 (bsc#1051510).
- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).
- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).
- intel_th: Do not reference unassigned outputs (bsc#1051510).
- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).
- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).
- iomap: warn on zero-length mappings (bsc#1127062).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).
- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).
- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).
- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).
- ipmi:pci: Blacklist a Realtek 'IPMI' device (git-fixes).
- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).
- ipsec: check return value of skb_to_sgvec always (bsc#1051510).
- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).
- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).
- ipv6: addrlabel: per netns list (bsc#1122982).
- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).
- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).
- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).
- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982). Refresh patches.suse/ip6_vti-fix-a-null-pointer-deference-when-destroy-vt.patch
- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).
- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).
- ip: validate header length on virtual device xmit (networking-stable-19_01_04).
- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).
- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).
- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).
- iscsi target: fix session creation failure handling (bsc#1051510).
- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).
- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).
- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).
- iser: set sector for ambiguous mr status errors (bsc#1051510).
- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).
- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).
- iwlwifi: mvm: fix RSS config command (bsc#1051510).
- iwlwifi: pcie: fix emergency path (bsc#1051510).
- iwlwifi: pcie: fix TX while flushing (bsc#1120902).
- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).
- ixgbe: check return value of napi_complete_done() (bsc#1051510).
- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).
- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).
- kABI: fix xhci kABI stability (bsc#1119086).
- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).
- kabi: handle addition of uevent_sock into struct net (bsc#1122982).
- kABI: Preserve kABI for dma_max_mapping_size() (bsc#1120008).
- kABI: protect struct sctp_association (kabi).
- kABI: protect struct smc_buf_desc (bnc#1117947, LTC#173662).
- kABI: protect struct smc_link (bnc#1117947, LTC#173662).
- kABI: protect vhost_log_write (kabi).
- kabi: restore ip_tunnel_delete_net() (bsc#1122982).
- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).
- kABI workaround for bt_accept_enqueue() change (bsc#1051510).
- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).
- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).
- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).
- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).
- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).
- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).
- keys: allow reaching the keys quotas exactly (bsc#1051510).
- keys: Timestamp new keys (bsc#1051510).
- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).
- kgdboc: Fix restrict error (bsc#1051510).
- kgdboc: Fix warning with module build (bsc#1051510).
- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).
- kobject: copy env blob in one go (bsc#1122982).
- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).
- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).
- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).
- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).
- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).
- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).
- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- kvm: x86: fix L1TF's MMIO GFN calculation (bsc#1124204).
- kvm: x86: Fix single-step debugging (bsc#1129295).
- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).
- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).
- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).
- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).
- lan78xx: Resolve issue with changing MAC address (bsc#1051510).
- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).
- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).
- libceph: handle an empty authorize reply (bsc#1126789).
- lib/div64.c: off by one in shift (bsc#1051510).
- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).
- libnvdimm/label: Clear 'updating' flag after label-set update (bsc#1129543).
- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).
- lib/rbtree-test: lower default params (git-fixes).
- lightnvm: fail fast on passthrough commands (bsc#1125780).
- livepatch: Change unsigned long old_addr -> void *old_func in struct klp_func (bsc#1071995).
- livepatch: Consolidate klp_free functions (bsc#1071995 ).
- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).
- livepatch: Define a macro for new API identification (bsc#1071995).
- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).
- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).
- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).
- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).
- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).
- livepatch: Remove signal sysfs attribute (bsc#1071995 ).
- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).
- livepatch: Send a fake signal periodically (bsc#1071995 ).
- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).
- livepatch: Simplify API by removing registration step (bsc#1071995).
- llc: do not use sk_eat_skb() (bsc#1051510).
- lockd: fix access beyond unterminated strings in prints (git-fixes).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: drop caches if offset or block_size are changed (bsc#1124975).
- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).
- lsm: Check for NULL cred-security on free (bsc#1051510).
- mac80211: Add attribute aligned(2) to struct 'action' (bsc#1051510).
- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).
- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).
- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).
- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).
- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).
- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).
- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).
- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).
- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).
- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).
- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).
- media: s5k4ecgx: delete a bogus error message (bsc#1051510).
- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).
- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).
- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).
- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).
- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).
- media: uvcvideo: Fix 'type' check leading to overflow (bsc#1051510).
- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).
- media: v4l2-tpg: array index could become negative (bsc#1051510).
- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).
- media: vb2: be sure to unlock mutex on errors (bsc#1051510).
- media: vb2: vb2_mmap: move lock up (bsc#1051510).
- media: vivid: fix error handling of kthread_run (bsc#1051510).
- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).
- media: vivid: set min width/height to a value > 0 (bsc#1051510).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).
- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).
- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).
- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).
- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).
- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).
- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).
- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).
- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).
- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).
- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).
- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).
- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).
- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).
- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).
- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).
- misc: sram: enable clock before registering regions (bsc#1051510).
- misc: sram: fix resource leaks in probe error path (bsc#1051510).
- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).
- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).
- mISDN: fix a race in dev_expire_timer() (bsc#1051510).
- mlx4: trigger IB events needed by SMC (bnc#1117947, LTC#173662).
- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).
- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).
- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).
- mmap: relax file size limit for regular files (git fixes (mm/mmap)).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).
- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).
- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).
- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).
- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).
- mmc: omap: fix the maximum timeout setting (bsc#1051510).
- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).
- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).
- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).
- mmc: spi: Fix card detection during probe (bsc#1051510).
- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).
- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).
- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).
- mm/ksm.c: ignore STABLE_FLAG of rmap_item->address in rmap_walk_ksm() (git fixes (mm/ksm)).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).
- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).
- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)
- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).
- mm: migration: factor out code to compute expected number of page references (bsc#1084216).
- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).
- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).
- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).
- Moved patches.fixes/x86-add-tsx-force-abort-cpuid-msr.patch to patches.arch/ and added upstream tags (bsc#1129363)
- mpt3sas: check sense buffer before copying sense data (bsc#1106811).
- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).
- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).
- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).
- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).
- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).
- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).
- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).
- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).
- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).
- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).
- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).
- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).
- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).
- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).
- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).
- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).
- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).
- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).
- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).
- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).
- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).
- mtd: nand: ifc: update bufnum mask for ver >= 2.0.0 (bsc#1051510).
- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).
- mtd: nand: omap2: Fix subpage write (bsc#1051510).
- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).
- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).
- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).
- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).
- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).
- mtd: nand: vf610: set correct ooblayout (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).
- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).
- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).
- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).
- mv88e6060: disable hardware level MAC learning (bsc#1051510).
- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).
- neighbour: Avoid writing before skb->head in neigh_hh_output() (networking-stable-18_12_12).
- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).
- net: add uevent socket member (bsc#1122982).
- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).
- net: aquantia: fixed instack structure overflow (git-fixes).
- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).
- net: bcmgenet: abort suspend on error (bsc#1051510).
- net: bcmgenet: code movement (bsc#1051510).
- net: bcmgenet: fix OF child-node lookup (bsc#1051510).
- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).
- net: bcmgenet: return correct value 'ret' from bcmgenet_power_down (bsc#1051510).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).
- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).
- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- net: do not call update_pmtu unconditionally (bsc#1123456).
- net: Do not default Cavium PTP driver to 'y' (bsc#1110096).
- net: dp83640: expire old TX-skb (networking-stable-19_02_10).
- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).
- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).
- net: ena: fix race between link up and device initalization (bsc#1083548).
- netfilter: nf_tables: check the result of dereferencing base_chain->stats (git-fixes).
- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).
- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).
- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).
- net: hns3: add handling for big TX fragment (bsc#1104353 ).
- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).
- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).
- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).
- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).
- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).
- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).
- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).
- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).
- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).
- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).
- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).
- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).
- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).
- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).
- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).
- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).
- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Release resource on error flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).
- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).
- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).
- netns: restrict uevents (bsc#1122982).
- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).
- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).
- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).
- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).
- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).
- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).
- netrom: switch to sock timer API (bsc#1051510).
- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).
- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).
- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).
- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).
- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).
- net/smc: abort CLC connection in smc_release (bnc#1117947, LTC#173662).
- net/smc: add infrastructure to send delete rkey messages (bnc#1117947, LTC#173662).
- net/smc: add SMC-D shutdown signal (bnc#1117947, LTC#173662).
- net/smc: allow fallback after clc timeouts (bnc#1117947, LTC#173662).
- net/smc: atomic SMCD cursor handling (bnc#1117947, LTC#173662).
- net/smc: avoid a delay by waiting for nothing (bnc#1117947, LTC#173662).
- net/smc: cleanup listen worker mutex unlocking (bnc#1117947, LTC#173662).
- net/smc: cleanup tcp_listen_worker initialization (bnc#1117947, LTC#173662).
- net/smc: enable fallback for connection abort in state INIT (bnc#1117947, LTC#173662).
- net/smc: fix non-blocking connect problem (bnc#1117947, LTC#173662).
- net/smc: fix sizeof to int comparison (bnc#1117947, LTC#173662).
- net/smc: fix smc_buf_unuse to use the lgr pointer (bnc#1117947, LTC#173662).
- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).
- net/smc: make smc_lgr_free() static (bnc#1117947, LTC#173662).
- net/smc: no link delete for a never active link (bnc#1117947, LTC#173662).
- net/smc: no urgent data check for listen sockets (bnc#1117947, LTC#173662).
- net/smc: remove duplicate mutex_unlock (bnc#1117947, LTC#173662).
- net/smc: remove sock_error detour in clc-functions (bnc#1117947, LTC#173662).
- net/smc: short wait for late smc_clc_wait_msg (bnc#1117947, LTC#173662).
- net/smc: unregister rkeys of unused buffer (bnc#1117947, LTC#173662).
- net/smc: use after free fix in smc_wr_tx_put_slot() (bnc#1117947, LTC#173662).
- net/smc: use queue pair number when matching link group (bnc#1117947, LTC#173662).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).
- net: stmmac: Fix PCI module removal leak (git-fixes).
- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).
- net: stmmac: Use mutex instead of spinlock (git-fixes).
- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).
- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).
- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).
- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).
- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).
- nfit: acpi_nfit_ctl(): Check out_obj->type in the right place (bsc#1129547).
- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).
- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).
- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).
- nfs: Allow NFSv4 mounts to not share transports ().
- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).
- nfsd: Fix an Oops in free_session() (git-fixes).
- nfs: Fix a missed page unlock after pg_doio() (git-fixes).
- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).
- nfs: support 'nosharetransport' option (bnc#807502, bnc#828192, ).
- nfsv4.1: Fix the r/wsize checking (git-fixes).
- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).
- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).
- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).
- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).
- nvme: kABI fix for scan_lock (bsc#1123882).
- nvme: lock NS list changes while handling command effects (bsc#1123882).
- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).
- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).
- nvme-multipath: round-robin I/O policy (bsc#1110705).
- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).
- of, numa: Validate some distance map rules (bsc#1051510).
- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).
- omap2fb: Fix stack memory disclosure (bsc#1120902)
- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).
- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).
- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).
- packet: Do not leak dev refcounts on error exit (git-fixes).
- packet: validate address length if non-zero (networking-stable-19_01_04).
- packet: validate address length (networking-stable-19_01_04).
- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).
- Partially revert 'block: fail op_is_write() requests to (bsc#1125252).
- pci: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).
- pci: Disable broken RTIT_BAR of Intel TH (bsc#1120318).
- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).
- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).
- pcrypt: use format specifier in kobject_add (bsc#1051510).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).
- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).
- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).
- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).
- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).
- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).
- phy: tegra: remove redundant self assignment of 'map' (bsc#1051510).
- phy: work around 'phys' references to usb-nop-xceiv devices (bsc#1051510).
- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).
- pinctrl: meson: fix pull enable register calculation (bsc#1051510).
- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).
- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).
- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).
- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).
- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).
- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).
- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).
- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).
- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).
- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).
- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).
- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).
- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).
- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).
- powerpc: Add an option to disable static PCI bus numbering (bsc#1122159).
- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).
- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).
- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).
- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).
- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).
- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).
- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).
- powerpc/tm: Fix comment (bsc#1118338).
- powerpc/tm: Fix endianness flip on trap (bsc#1118338).
- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).
- powerpc/tm: Fix HTM documentation (bsc#1118338).
- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).
- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).
- powerpc/tm: Print 64-bits MSR (bsc#1118338).
- powerpc/tm: Print scratch value (bsc#1118338).
- powerpc/tm: Reformat comments (bsc#1118338).
- powerpc/tm: Remove msr_tm_active() (bsc#1118338).
- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).
- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).
- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).
- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).
- powerpc/tm: Update function prototype comment (bsc#1118338).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).
- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).
- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).
- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).
- ptp_kvm: probe for kvm guest availability (bsc#1098382).
- ptr_ring: wrap back ->producer in __ptr_ring_swap_queue() (networking-stable-19_01_04).
- Put the xhci fix patch to the right place in the sorted section
- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).
- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).
- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).
- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).
- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).
- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).
- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).
- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).
- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).
- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).
- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).
- rdma/core: Fix unwinding flow in case of error to register device (bsc#1046306).
- rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).
- Reenable iscsi_tcp module (bsc#1127081)
- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)
- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).
- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).
- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).
- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).
- remove 2 entries since now we have them, 744889b7cbb56a64f957e65ade7cb65fe3f35714 1adfc5e4136f5967d591c399aff95b3b035f16b7
- Remove blacklist of virtio patch so we can install it (bsc#1114585)
- Remove conditional support for SMB2 and SMB3:
- Revert 'drm/rockchip: Allow driver to be shutdown on reboot/kexec' (bsc#1051510).
- Revert 'Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G' (bsc#1051510).
- Revert 'openvswitch: Fix template leak in error cases.' (bsc#1051510).
- Revert 'rpm/kernel-binary.spec.in: rename kGraft to KLP ()' This reverts commit f84e065a0c26b5f0777e94ceb67dd494bb7b4d2f. The patch should not have gone to SLE12-SP4. SLE12-SP4 still follows kGraft naming.
- Revert 'scsi: qla2xxx: Fix NVMe Target discovery' (bsc#1125252).
- Revert 'sd: disable logical block provisioning if 'lbpme' is not set' This reverts commit e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not accepted upstream.
- Revert 'serial: 8250: Fix clearing FIFOs in RS485 mode again' (bsc#1051510).
- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.
- Revert 'xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue' (bsc#1120854).
- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).
- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697)
- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)
- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).
- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).
- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).
- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).
- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).
- s390/early: improve machine detection (git-fixes).
- s390/ism: clear dmbe_mask bit before SMC IRQ handling (bnc#1117947, LTC#173662).
- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).
- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).
- s390/qeth: fix use-after-free in error path (bsc#1127534).
- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).
- s390/sthyi: Fix machine name validity indication (git-fixes).
- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).
- sata_rcar: fix deferred probing (bsc#1051510).
- sbus: char: add of_node_put() (bsc#1051510).
- sc16is7xx: Fix for multi-channel stall (bsc#1051510).
- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).
- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- sch_multiq: fix double free on init failure (bsc#1051510).
- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes
- scripts/git_sort/git_sort.py: Add s390/linux.git fixes.
- scripts/git_sort/git_sort.py: add vfs 'fixes' branch
- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).
- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).
- SCSI: fix queue cleanup race before queue initialization is done (bsc#1125252).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).
- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).
- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).
- scsi: lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).
- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).
- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).
- scsi: lpfc: fix remoteport access (bsc#1125252).
- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).
- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).
- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).
- scsi: mpt3sas: Add ioc_<level> logging macros (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_<level> with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_<level> with MPT3SAS_FMT to ioc_<level> (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).
- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).
- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).
- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).
- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).
- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).
- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).
- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).
- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).
- scsi: qla2xxx: Simplify conditional check (bsc#1094555).
- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).
- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).
- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).
- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).
- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).
- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).
- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).
- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).
- sctp: kfree_rcu asoc (networking-stable-18_12_12).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).
- selftests/livepatch: introduce tests (bsc#1071995).
- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).
- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).
- selinux: always allow mounting submounts (bsc#1051510).
- selinux: fix GPF on invalid policy (bsc#1051510).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).
- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).
- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).
- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).
- serial: imx: fix error handling in console_setup (bsc#1051510).
- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).
- serial/sunsu: fix refcount leak (bsc#1051510).
- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).
- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).
- signal: Always deliver the kernel's SIGKILL and SIGSTOP to a pid namespace init (git-fixes).
- skge: potential memory corruption in skge_get_regs() (bsc#1051510).
- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).
- sky2: Increase D3 delay again (bsc#1051510).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).
- smb3.1.1 dialect is no longer experimental (bsc#1051510).
- smb311: Fix reconnect (bsc#1051510).
- smb311: Improve checking of negotiate security contexts (bsc#1051510).
- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).
- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).
- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).
- smb3: check for and properly advertise directory lease support (bsc#1051510).
- smb3: directory sync should not return an error (bsc#1051510).
- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).
- smb3: do not request leases in symlink creation and query (bsc#1051510).
- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510).
- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).
- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).
- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).
- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).
- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).
- smb3: fix various xid leaks (bsc#1051510).
- [SMB3] Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510).
- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).
- [SMB3] Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510).
- smb3: remove noisy warning message on mount (bsc#1129664).
- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).
- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).
- soc/tegra: Do not leak device tree node reference (bsc#1051510).
- splice: do not merge into linked buffers (git-fixes).
- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).
- staging: iio: ad7780: update voltage on read (bsc#1051510).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).
- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).
- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).
- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).
- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).
- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).
- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).
- staging: speakup: Replace strncpy with memcpy (bsc#1051510).
- staging: wilc1000: fix to set correct value for 'vif_num' (bsc#1051510).
- sunrpc: correct the computation for page_ptr when truncating (git-fixes).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- sunrpc: Fix leak of krb5p encode pages (git-fixes).
- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).
- sunrpc: safely reallow resvport min/max inversion (git-fixes).
- supported.conf
- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).
- swiotlb: Add is_swiotlb_active() function (bsc#1120008).
- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).
- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).
- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).
- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).
- tcp: batch tcp_net_metrics_exit (bsc#1122982).
- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).
- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).
- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).
- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).
- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).
- tcp: lack of available data can also cause TSO defer (git-fixes).
- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).
- team: Free BPF filter when unregistering netdev (bsc#1051510).
- Thermal: do not clear passive state during system sleep (bsc#1051510).
- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).
- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).
- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).
- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).
- thermal: mediatek: fix register index error (bsc#1051510).
- timekeeping: Use proper seqcount initializer (bsc#1051510).
- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).
- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).
- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).
- tipc: fix a double kfree_skb() (networking-stable-19_01_04).
- tipc: fix a race condition of releasing subscriber object (bsc#1051510).
- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).
- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).
- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).
- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).
- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).
- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).
- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).
- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).
- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).
- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).
- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).
- tracing: Do not free iter->trace in fail path of tracing_open_pipe() (bsc#1129581).
- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).
- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).
- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).
- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).
- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).
- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).
- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).
- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).
- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).
- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).
- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).
- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).
- uevent: add alloc_uevent_skb() helper (bsc#1122982).
- uio_hv_generic: defer opening vmbus until first use (bsc#1127577).
- uio_hv_generic: set callbacks on open (bsc#1127577).
- uio: introduce UIO_MEM_IOVA (bsc#1127577).
- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).
- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).
- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.
- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).
- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).
- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).
- usb: Add new USB LPM helpers (bsc#1120902).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).
- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).
- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).
- usb: dwc3: gadget: Clear req->needs_extra_trb flag on cleanup (bsc#1120902).
- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).
- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).
- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).
- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).
- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).
- usb: musb: dsps: fix otg state machine (bsc#1051510).
- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).
- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).
- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).
- usb: phy: am335x: fix race condition in _probe (bsc#1051510).
- usb: serial: option: add Fibocom NL678 series (bsc#1120902).
- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).
- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).
- usb: storage: add quirk for SMI SM3350 (bsc#1120902).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).
- usb: xhci: fix 'broken_suspend' placement in struct xchi_hcd (bsc#1119086).
- veth: set peer GSO values (bsc#1051510).
- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).
- vfio: ccw: process ssch with interrupts disabled (git-fixes).
- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).
- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).
- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).
- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).
- vhost: log dirty page correctly (networking-stable-19_01_26).
- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).
- vhost/vsock: fix uninitialized vhost_vsock->guest_cid (bsc#1051510).
- video: clps711x-fb: release disp device node in probe() (bsc#1051510).
- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).
- virtio: Introduce virtio_max_dma_size() (bsc#1120008).
- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).
- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).
- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).
- virtio/s390: avoid race on vcdev->config (git-fixes).
- virtio/s390: fix race in ccw_io_helper() (git-fixes).
- vmbus: fix subchannel removal (bsc#1127577).
- vmbus: keep pointer to ring buffer page (bsc#1127577).
- vmbus: pass channel to hv_process_channel_removal (bsc#1127577).
- vmbus: split ring buffer allocation from open (bsc#1127577).
- VMCI: Support upto 64-bit PPNs (bsc#1127286).
- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).
- VSOCK: Send reset control packet when socket is partially bound (networking-stable-19_01_04).
- vt: invoke notifier on screen size change (bsc#1051510).
- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).
- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).
- vxlan: test dev->flags & IFF_UP before calling gro_cells_receive() (git-fixes).
- vxlan: update skb dst pmtu on tx path (bsc#1123456).
- w90p910_ether: remove incorrect __init annotation (bsc#1051510).
- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).
- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).
- writeback: do not decrement wb->refcnt if !wb->bdi (git fixes (writeback)).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86/amd_nb: Add PCI device IDs for family 17h, model 30h ().
- x86/amd_nb: Add support for newer PCI topologies ().
- x86/a.out: Clear the dump structure initially (bsc#1114279).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).
- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).
- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).
- x86/bugs: Add AMD's variant of SSB_NO (bsc#1114279).
- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).
- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).
- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).
- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).
- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).
- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).
- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).
- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).
- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).
- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).
- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).
- x86/vdso: Remove obsolete 'fake section table' reservation (bsc#1114279).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).
- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).
- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: fix dom0 boot on huge systems (bsc#1127836).
- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).
- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).
- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).
- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).
- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).
- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).
- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).
- Yama: Check for pid death before checking ancestry (bsc#1051510).
- yam: fix a missing-check bug (bsc#1051510).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).
Patchnames
SUSE-2019-767,SUSE-SLE-SERVER-12-SP4-2019-767
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise Server 12 SP4 Azure kernel was updated to fix various issues.\n\nThe following security bugs were fixed:\n\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166 1128378 1129016).\n- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).\n- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) can cause a system lock up and a denial of service. (bnc#1123161).\n- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglected to set a NULL value for a certain structure member, which led to a use-after-free in sockfs_setattr (bnc#1125907 1126284).\n- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).\n- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).\n- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host\u0027s stack memory contents to a guest (bsc#1124735).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).\n- CVE-2018-20669: An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c where a local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation (bnc#1122971).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).\n- 9p: clear dangling pointers in p9stat_free (bsc#1051510).\n- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).\n- 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n- 9p/net: put a lower bound on msize (bsc#1051510).\n- 9p: use inode-\u003ei_lock to protect i_size_write() under 32-bit (bsc#1051510).\n- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).\n- acpi / device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).\n- acpi/nfit: Block function zero DSMs (bsc#1051510).\n- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).\n- acpi/nfit: Fix bus command validation (bsc#1051510).\n- acpi/nfit: Fix command-supported detection (bsc#1051510).\n- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).\n- acpi/nfit: Fix user-initiated ARS to be \u0027ARS-long\u0027 rather than \u0027ARS-short\u0027 (bsc#1124969).\n- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).\n- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).\n- acpi / video: Extend chassis-type detection with a \u0027Lunch Box\u0027 check (bsc#1051510).\n- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705\n- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).\n- add mainline tags for two hyperv iommu patches\n- Adjust a commit id in a nvme patch to make our scripts happy\n- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).\n- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).\n- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).\n- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).\n- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).\n- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).\n- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).\n- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).\n- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).\n- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).\n- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).\n- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).\n- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).\n- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).\n- alsa: hda - Serialize codec registrations (bsc#1122944).\n- alsa: hda - Use standard device registration for beep (bsc#1122944).\n- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).\n- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).\n- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).\n- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).\n- altera-stapl: check for a null key before strcasecmp\u0027ing it (bsc#1051510).\n- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).\n- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).\n- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).\n- arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).\n- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).\n- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).\n- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).\n- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n- arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).\n- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).\n- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).\n- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).\n- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).\n- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).\n- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).\n- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).\n- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).\n- arm: pxa: avoid section mismatch warning (bsc#1051510).\n- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).\n- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).\n- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).\n- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).\n- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).\n- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).\n- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).\n- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).\n- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).\n- assoc_array: Fix shortcut creation (bsc#1051510).\n- ata: ahci: mvebu: remove stale comment (bsc#1051510).\n- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).\n- ath9k: dynack: check da-\u003eenabled first in sampling routines (bsc#1051510).\n- ath9k: dynack: make ewma estimation faster (bsc#1051510).\n- ath9k: dynack: use authentication messages for \u0027late\u0027 ack (bsc#1051510).\n- atm: he: fix sign-extension overflow on large shift (bsc#1051510).\n- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).\n- ax25: fix possible use-after-free (bsc#1051510).\n- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)\n- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).\n- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).\n- batman-adv: Force mac header to start of data on xmit (bsc#1051510).\n- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).\n- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).\n- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).\n- blk-mq: fix a hung issue when fsync (bsc#1125252).\n- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).\n- block: break discard submissions into the user defined size (git-fixes).\n- block: cleanup __blkdev_issue_discard() (git-fixes).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- blockdev: Fix livelocks on loop device (bsc#1124984).\n- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128895).\n- block: do not warn when doing fsync on read-only devices (bsc#1125252).\n- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).\n- block: fix infinite loop if the device loses discard capability (git-fixes).\n- block/loop: Use global lock for ioctl() operation (bsc#1124974).\n- block: make sure discard bio is aligned with logical block size (git-fixes).\n- block: make sure writesame bio is aligned with logical block size (git-fixes).\n- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).\n- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).\n- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).\n- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).\n- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).\n- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).\n- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).\n- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).\n- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282 ).\n- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).\n- bonding: update nest level on unlink (git-fixes).\n- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).\n- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).\n- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1083647).\n- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).\n- bpf: Fix syscall\u0027s stackmap lookup potential deadlock (bsc#1083647).\n- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).\n- bpf/verifier: fix verifier instability (bsc#1056787).\n- bsg: allocate sense buffer if requested (bsc#1106811).\n- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).\n- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).\n- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).\n- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).\n- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).\n- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).\n- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).\n- btrfs: fix fsync after succession of renames of different files (bsc#1126481).\n- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).\n- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).\n- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).\n- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).\n- btrfs: Improve btrfs_search_slot description (bsc#1126802).\n- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1063638).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).\n- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).\n- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).\n- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1063638).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).\n- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).\n- btrfs: remove always true check in unlock_up (bsc#1126802).\n- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).\n- btrfs: remove unnecessary level check in balance_level (bsc#1126802).\n- btrfs: remove unused check of skip_locking (bsc#1126802).\n- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).\n- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).\n- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n- btrfs: split btrfs_extent_same (bsc#1127493).\n- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).\n- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).\n- can: bcm: check timer values before ktime conversion (bsc#1051510).\n- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).\n- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).\n- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).\n- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126790).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).\n- cfg80211: extend range deviation for DMG (bsc#1051510).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).\n- checkstack.pl: fix for aarch64 (bsc#1051510).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: add missing debug entries for kconfig options (bsc#1051510).\n- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510).\n- cifs: add sha512 secmech (bsc#1051510).\n- cifs: Add support for reading attributes on SMB2+ (bsc#1051510).\n- cifs: Add support for writing attributes on SMB2+ (bsc#1051510).\n- cifs: Always resolve hostname before reconnecting (bsc#1051510).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).\n- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).\n- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).\n- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510).\n- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).\n- cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n- cifs: fix return value for cifs_listxattr (bsc#1051510).\n- cifs: Fix separator when building path from dentry (bsc#1051510).\n- cifs: fix set info (bsc#1051510).\n- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).\n- cifs: fix wrapping bugs in num_entries() (bsc#1051510).\n- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: implement v3.11 preauth integrity (bsc#1051510).\n- cifs: invalidate cache when we truncate a file (bsc#1051510).\n- cifs: make \u0027nodfs\u0027 mount opt a superblock flag (bsc#1051510).\n- cifs: OFD locks do not conflict with eachothers (bsc#1051510).\n- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).\n- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: refactor crypto shash/sdesc allocation\u0026free (bsc#1051510).\n- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).\n- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).\n- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).\n- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).\n- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).\n- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).\n- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).\n- clk: imx6q: reset exclusive gates on init (bsc#1051510).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).\n- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).\n- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).\n- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).\n- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).\n- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).\n- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).\n- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).\n- clk: socfpga: fix refcount leak (bsc#1051510).\n- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).\n- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).\n- clk: sunxi-ng: enable so-said LDOs for A64 SoC\u0027s pll-mipi clock (bsc#1051510).\n- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).\n- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).\n- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).\n- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).\n- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).\n- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).\n- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).\n- configfs: fix registered group removal (bsc#1051510).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).\n- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).\n- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).\n- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).\n- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).\n- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).\n- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).\n- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).\n- crypto: ahash - fix another early termination in hash walk (bsc#1051510).\n- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).\n- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).\n- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).\n- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).\n- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).\n- crypto: caam - fixed handling of sg list (bsc#1051510).\n- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).\n- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).\n- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).\n- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).\n- crypto: hash - set CRYPTO_TFM_NEED_KEY if -\u003esetkey() fails (bsc#1051510).\n- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).\n- crypto: tgr192 - fix unaligned memory access (bsc#1051510).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).\n- cw1200: drop useless LIST_HEAD (bsc#1051510).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).\n- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).\n- debugfs: fix debugfs_rename parameter checking (bsc#1051510).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).\n- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).\n- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).\n- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).\n- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).\n- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).\n- dmaengine: at_hdmac: fix module unloading (bsc#1051510).\n- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).\n- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).\n- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).\n- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).\n- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).\n- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).\n- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).\n- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).\n- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).\n- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).\n- dma: Introduce dma_max_mapping_size() (bsc#1120008).\n- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).\n- dm: call blk_queue_split() to impose device limits on bios (git-fixes).\n- dm: do not allow readahead to limit IO size (git-fixes).\n- dm thin: send event about thin-pool state change _after_ making it (git-fixes).\n- dm zoned: Fix target BIO completion handling (git-fixes).\n- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).\n- doc/README.SUSE: Correct description for building a kernel (bsc#1123348)\n- Do not log confusing message on reconnect by default (bsc#1129664).\n- Do not log expected error on DFS referral request (bsc#1051510).\n- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).\n- driver core: Move async_synchronize_full call (bsc#1051510).\n- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).\n- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: Remove the useless API vmbus_get_outgoing_channel() (bsc#1127577).\n- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).\n- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).\n- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- drivers/sbus/char: add of_node_put() (bsc#1051510).\n- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).\n- drm/ast: Fix connector leak during driver unload (bsc#1051510).\n- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).\n- drm/atomic-helper: Complete fake_commit-\u003eflip_done potentially earlier (bsc#1051510).\n- drm: Block fb changes for async plane updates (bsc#1051510).\n- drm/bridge: tc358767: add defines for DP1_SRCCTRL \u0026 PHY_2LANE (bsc#1051510).\n- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).\n- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).\n- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).\n- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).\n- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n- drm: Clear state-\u003eacquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).\n- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).\n- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)\n- drm/etnaviv: potential NULL dereference (bsc#1113722)\n- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)\n- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)\n- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)\n- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n- drm/i915/gvt: Fix mmap range check (bsc#1120902)\n- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)\n- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).\n- drm/i915/opregion: fix version check (bsc#1113722)\n- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)\n- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)\n- drm/meson: add missing of_node_put (bsc#1051510).\n- drm/modes: Prevent division by zero htotal (bsc#1051510).\n- drm/msm: Fix error return checking (bsc#1051510).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).\n- drm/msm: Unblock writer if reader closes file (bsc#1051510).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)\n- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).\n- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)\n- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)\n- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).\n- drm/rockchip: fix for mailbox read size (bsc#1051510).\n- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)\n- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)\n- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)\n- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).\n- earlycon: Initialize port-\u003euartclk based on clock-frequency property (bsc#1051510).\n- earlycon: Remove hardcoded port-\u003euartclk initialization in of_setup_earlycon (bsc#1051510).\n- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n- Enable livepatch test drivers in lib/ Livepatch kselftests need those.\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).\n- enic: fix checksum validation for IPv6 (bsc#1051510).\n- esp6: fix memleak on error path in esp6_input (bsc#1051510).\n- esp: Fix locking on page fragment allocation (bsc#1051510).\n- esp: Fix memleaks on error paths (bsc#1051510).\n- esp: Fix skb tailroom calculation (bsc#1051510).\n- exportfs: do not read dentry after free (bsc#1051510).\n- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).\n- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).\n- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).\n- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).\n- fat: validate -\u003ei_start before using (bsc#1051510).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1113722)\n- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).\n- Fix kabi issues with new transport sharing code (bsc#1114893).\n- Fix problem with sharetransport= and NFSv4 (bsc#1114893).\n- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).\n- floppy: check_events callback should not return a negative number (bsc#1051510).\n- fork: do not copy inconsistent signal handler state to child (bsc#1051510).\n- fork: record start_time late (git-fixes).\n- fork: unconditionally clear stack on fork (git-fixes).\n- fs/cifs: require sha512 (bsc#1051510).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).\n- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).\n- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).\n- fuse: handle zero sized retrieve correctly (bsc#1051510).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bsc#1051510).\n- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).\n- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).\n- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).\n- geneve, vxlan: Do not set exceptions if skb-\u003elen \u003c mtu (bsc#1123456).\n- genwqe: Fix size check (bsc#1051510).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bsc#1120601).\n- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).\n- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).\n- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).\n- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).\n- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).\n- gpio: pl061: handle failed allocations (bsc#1051510).\n- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).\n- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)\n- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).\n- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).\n- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).\n- hfs: do not free node before using (bsc#1051510).\n- hfsplus: do not free node before using (bsc#1051510).\n- hfsplus: prevent btree data loss on root split (bsc#1051510).\n- hfs: prevent btree data loss on root split (bsc#1051510).\n- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).\n- hpet: Fix missing \u0027=\u0027 character in the __setup() code of hpet_mmap_enable (git-fixes).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).\n- hv_uio_generic: map ringbuffer phys addr (bsc#1127577).\n- hv: v4.12 API for hyperv-iommu (bsc#1122822).\n- hwmon/k10temp: Add support for AMD family 17h, model 30h CPUs ().\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).\n- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).\n- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).\n- hyperv/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).\n- i2c-axxia: check for error conditions first (bsc#1051510).\n- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).\n- i2c: cadence: Fix the hold bit setting (bsc#1051510).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).\n- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).\n- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).\n- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).\n- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).\n- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).\n- ib/core: Destroy QP if XRC QP fails (bsc#1046306).\n- ib/core: Fix potential memory leak while creating MAD agents (bsc#1046306).\n- ib/core: Unregister notifier before freeing MAD security (bsc#1046306).\n- ib/hfi1: Close race condition on user context disable and close (bsc#1060463).\n- ib/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- ide: pmac: add of_node_put() (bsc#1051510).\n- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).\n- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).\n- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).\n- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).\n- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).\n- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).\n- input: bma150 - register input device after setting private data (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).\n- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).\n- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).\n- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).\n- input: raspberrypi-ts - fix link error (git-fixes).\n- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).\n- input: restore EV_ABS ABS_RESERVED (bsc#1051510).\n- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).\n- input: synaptics - enable SMBus for HP EliteBook 840 G4 (bsc#1051510).\n- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).\n- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).\n- intel_th: Do not reference unassigned outputs (bsc#1051510).\n- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).\n- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).\n- iomap: warn on zero-length mappings (bsc#1127062).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).\n- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).\n- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).\n- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).\n- ipmi:pci: Blacklist a Realtek \u0027IPMI\u0027 device (git-fixes).\n- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).\n- ipsec: check return value of skb_to_sgvec always (bsc#1051510).\n- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).\n- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: addrlabel: per netns list (bsc#1122982).\n- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).\n- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).\n- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982). Refresh patches.suse/ip6_vti-fix-a-null-pointer-deference-when-destroy-vt.patch\n- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).\n- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).\n- ip: validate header length on virtual device xmit (networking-stable-19_01_04).\n- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).\n- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).\n- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).\n- iscsi target: fix session creation failure handling (bsc#1051510).\n- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).\n- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).\n- iser: set sector for ambiguous mr status errors (bsc#1051510).\n- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).\n- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).\n- iwlwifi: mvm: fix RSS config command (bsc#1051510).\n- iwlwifi: pcie: fix emergency path (bsc#1051510).\n- iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).\n- ixgbe: check return value of napi_complete_done() (bsc#1051510).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).\n- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).\n- kABI: fix xhci kABI stability (bsc#1119086).\n- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).\n- kabi: handle addition of uevent_sock into struct net (bsc#1122982).\n- kABI: Preserve kABI for dma_max_mapping_size() (bsc#1120008).\n- kABI: protect struct sctp_association (kabi).\n- kABI: protect struct smc_buf_desc (bnc#1117947, LTC#173662).\n- kABI: protect struct smc_link (bnc#1117947, LTC#173662).\n- kABI: protect vhost_log_write (kabi).\n- kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).\n- kABI workaround for bt_accept_enqueue() change (bsc#1051510).\n- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).\n- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).\n- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).\n- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).\n- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).\n- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).\n- keys: allow reaching the keys quotas exactly (bsc#1051510).\n- keys: Timestamp new keys (bsc#1051510).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).\n- kgdboc: Fix restrict error (bsc#1051510).\n- kgdboc: Fix warning with module build (bsc#1051510).\n- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).\n- kobject: copy env blob in one go (bsc#1122982).\n- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).\n- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).\n- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).\n- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).\n- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: fix L1TF\u0027s MMIO GFN calculation (bsc#1124204).\n- kvm: x86: Fix single-step debugging (bsc#1129295).\n- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).\n- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).\n- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).\n- lan78xx: Resolve issue with changing MAC address (bsc#1051510).\n- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).\n- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).\n- libceph: handle an empty authorize reply (bsc#1126789).\n- lib/div64.c: off by one in shift (bsc#1051510).\n- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).\n- libnvdimm/label: Clear \u0027updating\u0027 flag after label-set update (bsc#1129543).\n- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).\n- lib/rbtree-test: lower default params (git-fixes).\n- lightnvm: fail fast on passthrough commands (bsc#1125780).\n- livepatch: Change unsigned long old_addr -\u003e void *old_func in struct klp_func (bsc#1071995).\n- livepatch: Consolidate klp_free functions (bsc#1071995 ).\n- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).\n- livepatch: Define a macro for new API identification (bsc#1071995).\n- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).\n- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).\n- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).\n- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).\n- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).\n- livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).\n- livepatch: Send a fake signal periodically (bsc#1071995 ).\n- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).\n- livepatch: Simplify API by removing registration step (bsc#1071995).\n- llc: do not use sk_eat_skb() (bsc#1051510).\n- lockd: fix access beyond unterminated strings in prints (git-fixes).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: drop caches if offset or block_size are changed (bsc#1124975).\n- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).\n- lsm: Check for NULL cred-security on free (bsc#1051510).\n- mac80211: Add attribute aligned(2) to struct \u0027action\u0027 (bsc#1051510).\n- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).\n- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).\n- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).\n- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).\n- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).\n- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).\n- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).\n- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).\n- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).\n- media: s5k4ecgx: delete a bogus error message (bsc#1051510).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).\n- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).\n- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).\n- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).\n- media: uvcvideo: Fix \u0027type\u0027 check leading to overflow (bsc#1051510).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).\n- media: v4l2-tpg: array index could become negative (bsc#1051510).\n- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).\n- media: vb2: be sure to unlock mutex on errors (bsc#1051510).\n- media: vb2: vb2_mmap: move lock up (bsc#1051510).\n- media: vivid: fix error handling of kthread_run (bsc#1051510).\n- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).\n- media: vivid: set min width/height to a value \u003e 0 (bsc#1051510).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).\n- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).\n- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).\n- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).\n- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).\n- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).\n- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).\n- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).\n- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).\n- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).\n- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).\n- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).\n- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).\n- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).\n- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).\n- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).\n- misc: sram: enable clock before registering regions (bsc#1051510).\n- misc: sram: fix resource leaks in probe error path (bsc#1051510).\n- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).\n- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).\n- mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n- mlx4: trigger IB events needed by SMC (bnc#1117947, LTC#173662).\n- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).\n- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).\n- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).\n- mmap: relax file size limit for regular files (git fixes (mm/mmap)).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).\n- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).\n- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).\n- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).\n- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).\n- mmc: omap: fix the maximum timeout setting (bsc#1051510).\n- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).\n- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n- mmc: spi: Fix card detection during probe (bsc#1051510).\n- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).\n- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).\n- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).\n- mm/ksm.c: ignore STABLE_FLAG of rmap_item-\u003eaddress in rmap_walk_ksm() (git fixes (mm/ksm)).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).\n- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).\n- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)\n- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).\n- mm: migration: factor out code to compute expected number of page references (bsc#1084216).\n- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).\n- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).\n- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).\n- Moved patches.fixes/x86-add-tsx-force-abort-cpuid-msr.patch to patches.arch/ and added upstream tags (bsc#1129363)\n- mpt3sas: check sense buffer before copying sense data (bsc#1106811).\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).\n- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).\n- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).\n- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).\n- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).\n- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).\n- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).\n- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).\n- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).\n- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).\n- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).\n- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).\n- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).\n- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).\n- mtd: nand: ifc: update bufnum mask for ver \u003e= 2.0.0 (bsc#1051510).\n- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).\n- mtd: nand: omap2: Fix subpage write (bsc#1051510).\n- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).\n- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).\n- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).\n- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).\n- mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).\n- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).\n- mv88e6060: disable hardware level MAC learning (bsc#1051510).\n- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).\n- neighbour: Avoid writing before skb-\u003ehead in neigh_hh_output() (networking-stable-18_12_12).\n- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).\n- net: add uevent socket member (bsc#1122982).\n- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).\n- net: aquantia: fixed instack structure overflow (git-fixes).\n- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).\n- net: bcmgenet: abort suspend on error (bsc#1051510).\n- net: bcmgenet: code movement (bsc#1051510).\n- net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n- net: bcmgenet: return correct value \u0027ret\u0027 from bcmgenet_power_down (bsc#1051510).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).\n- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- net: do not call update_pmtu unconditionally (bsc#1123456).\n- net: Do not default Cavium PTP driver to \u0027y\u0027 (bsc#1110096).\n- net: dp83640: expire old TX-skb (networking-stable-19_02_10).\n- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).\n- net: ena: fix race between link up and device initalization (bsc#1083548).\n- netfilter: nf_tables: check the result of dereferencing base_chain-\u003estats (git-fixes).\n- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).\n- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).\n- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).\n- net: hns3: add handling for big TX fragment (bsc#1104353 ).\n- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).\n- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).\n- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).\n- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).\n- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).\n- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).\n- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).\n- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).\n- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).\n- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).\n- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).\n- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).\n- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).\n- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).\n- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).\n- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).\n- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Release resource on error flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).\n- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).\n- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).\n- netns: restrict uevents (bsc#1122982).\n- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).\n- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).\n- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).\n- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).\n- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).\n- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).\n- netrom: switch to sock timer API (bsc#1051510).\n- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).\n- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).\n- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).\n- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).\n- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).\n- net/smc: abort CLC connection in smc_release (bnc#1117947, LTC#173662).\n- net/smc: add infrastructure to send delete rkey messages (bnc#1117947, LTC#173662).\n- net/smc: add SMC-D shutdown signal (bnc#1117947, LTC#173662).\n- net/smc: allow fallback after clc timeouts (bnc#1117947, LTC#173662).\n- net/smc: atomic SMCD cursor handling (bnc#1117947, LTC#173662).\n- net/smc: avoid a delay by waiting for nothing (bnc#1117947, LTC#173662).\n- net/smc: cleanup listen worker mutex unlocking (bnc#1117947, LTC#173662).\n- net/smc: cleanup tcp_listen_worker initialization (bnc#1117947, LTC#173662).\n- net/smc: enable fallback for connection abort in state INIT (bnc#1117947, LTC#173662).\n- net/smc: fix non-blocking connect problem (bnc#1117947, LTC#173662).\n- net/smc: fix sizeof to int comparison (bnc#1117947, LTC#173662).\n- net/smc: fix smc_buf_unuse to use the lgr pointer (bnc#1117947, LTC#173662).\n- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).\n- net/smc: make smc_lgr_free() static (bnc#1117947, LTC#173662).\n- net/smc: no link delete for a never active link (bnc#1117947, LTC#173662).\n- net/smc: no urgent data check for listen sockets (bnc#1117947, LTC#173662).\n- net/smc: remove duplicate mutex_unlock (bnc#1117947, LTC#173662).\n- net/smc: remove sock_error detour in clc-functions (bnc#1117947, LTC#173662).\n- net/smc: short wait for late smc_clc_wait_msg (bnc#1117947, LTC#173662).\n- net/smc: unregister rkeys of unused buffer (bnc#1117947, LTC#173662).\n- net/smc: use after free fix in smc_wr_tx_put_slot() (bnc#1117947, LTC#173662).\n- net/smc: use queue pair number when matching link group (bnc#1117947, LTC#173662).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).\n- net: stmmac: Fix PCI module removal leak (git-fixes).\n- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).\n- net: stmmac: Use mutex instead of spinlock (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).\n- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).\n- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).\n- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).\n- nfit: acpi_nfit_ctl(): Check out_obj-\u003etype in the right place (bsc#1129547).\n- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).\n- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).\n- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n- nfs: Allow NFSv4 mounts to not share transports ().\n- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).\n- nfsd: Fix an Oops in free_session() (git-fixes).\n- nfs: Fix a missed page unlock after pg_doio() (git-fixes).\n- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).\n- nfs: support \u0027nosharetransport\u0027 option (bnc#807502, bnc#828192, ).\n- nfsv4.1: Fix the r/wsize checking (git-fixes).\n- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).\n- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).\n- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).\n- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).\n- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).\n- nvme: kABI fix for scan_lock (bsc#1123882).\n- nvme: lock NS list changes while handling command effects (bsc#1123882).\n- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).\n- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).\n- nvme-multipath: round-robin I/O policy (bsc#1110705).\n- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).\n- of, numa: Validate some distance map rules (bsc#1051510).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).\n- omap2fb: Fix stack memory disclosure (bsc#1120902)\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).\n- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).\n- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).\n- packet: Do not leak dev refcounts on error exit (git-fixes).\n- packet: validate address length if non-zero (networking-stable-19_01_04).\n- packet: validate address length (networking-stable-19_01_04).\n- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).\n- Partially revert \u0027block: fail op_is_write() requests to (bsc#1125252).\n- pci: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).\n- pci: Disable broken RTIT_BAR of Intel TH (bsc#1120318).\n- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).\n- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).\n- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).\n- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).\n- pcrypt: use format specifier in kobject_add (bsc#1051510).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).\n- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).\n- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).\n- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).\n- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).\n- phy: tegra: remove redundant self assignment of \u0027map\u0027 (bsc#1051510).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bsc#1051510).\n- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).\n- pinctrl: meson: fix pull enable register calculation (bsc#1051510).\n- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).\n- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).\n- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).\n- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).\n- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).\n- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).\n- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).\n- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).\n- powerpc: Add an option to disable static PCI bus numbering (bsc#1122159).\n- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).\n- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).\n- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).\n- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).\n- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).\n- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).\n- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).\n- powerpc/tm: Fix comment (bsc#1118338).\n- powerpc/tm: Fix endianness flip on trap (bsc#1118338).\n- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).\n- powerpc/tm: Fix HTM documentation (bsc#1118338).\n- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).\n- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).\n- powerpc/tm: Print 64-bits MSR (bsc#1118338).\n- powerpc/tm: Print scratch value (bsc#1118338).\n- powerpc/tm: Reformat comments (bsc#1118338).\n- powerpc/tm: Remove msr_tm_active() (bsc#1118338).\n- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).\n- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).\n- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).\n- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).\n- powerpc/tm: Update function prototype comment (bsc#1118338).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).\n- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).\n- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).\n- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).\n- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).\n- ptp_kvm: probe for kvm guest availability (bsc#1098382).\n- ptr_ring: wrap back -\u003eproducer in __ptr_ring_swap_queue() (networking-stable-19_01_04).\n- Put the xhci fix patch to the right place in the sorted section\n- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).\n- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).\n- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).\n- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).\n- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).\n- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).\n- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).\n- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).\n- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).\n- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).\n- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).\n- rdma/core: Fix unwinding flow in case of error to register device (bsc#1046306).\n- rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n- Reenable iscsi_tcp module (bsc#1127081)\n- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).\n- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).\n- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).\n- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).\n- remove 2 entries since now we have them, 744889b7cbb56a64f957e65ade7cb65fe3f35714 1adfc5e4136f5967d591c399aff95b3b035f16b7\n- Remove blacklist of virtio patch so we can install it (bsc#1114585)\n- Remove conditional support for SMB2 and SMB3:\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1051510).\n- Revert \u0027Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G\u0027 (bsc#1051510).\n- Revert \u0027openvswitch: Fix template leak in error cases.\u0027 (bsc#1051510).\n- Revert \u0027rpm/kernel-binary.spec.in: rename kGraft to KLP ()\u0027 This reverts commit f84e065a0c26b5f0777e94ceb67dd494bb7b4d2f. The patch should not have gone to SLE12-SP4. SLE12-SP4 still follows kGraft naming.\n- Revert \u0027scsi: qla2xxx: Fix NVMe Target discovery\u0027 (bsc#1125252).\n- Revert \u0027sd: disable logical block provisioning if \u0027lbpme\u0027 is not set\u0027 This reverts commit e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not accepted upstream.\n- Revert \u0027serial: 8250: Fix clearing FIFOs in RS485 mode again\u0027 (bsc#1051510).\n- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.\n- Revert \u0027xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue\u0027 (bsc#1120854).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).\n- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697)\n- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)\n- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).\n- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).\n- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).\n- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).\n- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).\n- s390/early: improve machine detection (git-fixes).\n- s390/ism: clear dmbe_mask bit before SMC IRQ handling (bnc#1117947, LTC#173662).\n- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).\n- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).\n- s390/qeth: fix use-after-free in error path (bsc#1127534).\n- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).\n- s390/sthyi: Fix machine name validity indication (git-fixes).\n- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).\n- sata_rcar: fix deferred probing (bsc#1051510).\n- sbus: char: add of_node_put() (bsc#1051510).\n- sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).\n- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- sch_multiq: fix double free on init failure (bsc#1051510).\n- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes\n- scripts/git_sort/git_sort.py: Add s390/linux.git fixes.\n- scripts/git_sort/git_sort.py: add vfs \u0027fixes\u0027 branch\n- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).\n- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).\n- SCSI: fix queue cleanup race before queue initialization is done (bsc#1125252).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).\n- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).\n- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).\n- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).\n- scsi: lpfc: fix remoteport access (bsc#1125252).\n- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).\n- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).\n- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).\n- scsi: mpt3sas: Add ioc_\u003clevel\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u003clevel\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u003clevel\u003e with MPT3SAS_FMT to ioc_\u003clevel\u003e (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).\n- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).\n- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).\n- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).\n- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).\n- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).\n- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).\n- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).\n- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).\n- scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).\n- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).\n- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).\n- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).\n- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).\n- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).\n- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).\n- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).\n- sctp: kfree_rcu asoc (networking-stable-18_12_12).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).\n- selftests/livepatch: introduce tests (bsc#1071995).\n- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).\n- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).\n- selinux: always allow mounting submounts (bsc#1051510).\n- selinux: fix GPF on invalid policy (bsc#1051510).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).\n- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).\n- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).\n- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).\n- serial: imx: fix error handling in console_setup (bsc#1051510).\n- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).\n- serial/sunsu: fix refcount leak (bsc#1051510).\n- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).\n- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).\n- signal: Always deliver the kernel\u0027s SIGKILL and SIGSTOP to a pid namespace init (git-fixes).\n- skge: potential memory corruption in skge_get_regs() (bsc#1051510).\n- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).\n- sky2: Increase D3 delay again (bsc#1051510).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).\n- smb3.1.1 dialect is no longer experimental (bsc#1051510).\n- smb311: Fix reconnect (bsc#1051510).\n- smb311: Improve checking of negotiate security contexts (bsc#1051510).\n- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).\n- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).\n- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).\n- smb3: check for and properly advertise directory lease support (bsc#1051510).\n- smb3: directory sync should not return an error (bsc#1051510).\n- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).\n- smb3: do not request leases in symlink creation and query (bsc#1051510).\n- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510).\n- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).\n- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).\n- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).\n- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).\n- smb3: fix various xid leaks (bsc#1051510).\n- [SMB3] Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510).\n- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).\n- [SMB3] Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510).\n- smb3: remove noisy warning message on mount (bsc#1129664).\n- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).\n- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).\n- soc/tegra: Do not leak device tree node reference (bsc#1051510).\n- splice: do not merge into linked buffers (git-fixes).\n- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).\n- staging: iio: ad7780: update voltage on read (bsc#1051510).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).\n- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).\n- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).\n- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).\n- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).\n- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).\n- staging: speakup: Replace strncpy with memcpy (bsc#1051510).\n- staging: wilc1000: fix to set correct value for \u0027vif_num\u0027 (bsc#1051510).\n- sunrpc: correct the computation for page_ptr when truncating (git-fixes).\n- sunrpc: Fix a potential race in xprt_connect() (git-fixes).\n- sunrpc: Fix leak of krb5p encode pages (git-fixes).\n- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).\n- sunrpc: safely reallow resvport min/max inversion (git-fixes).\n- supported.conf\n- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).\n- swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).\n- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).\n- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).\n- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).\n- tcp: batch tcp_net_metrics_exit (bsc#1122982).\n- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).\n- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).\n- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).\n- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).\n- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).\n- tcp: lack of available data can also cause TSO defer (git-fixes).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).\n- team: Free BPF filter when unregistering netdev (bsc#1051510).\n- Thermal: do not clear passive state during system sleep (bsc#1051510).\n- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).\n- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).\n- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).\n- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).\n- thermal: mediatek: fix register index error (bsc#1051510).\n- timekeeping: Use proper seqcount initializer (bsc#1051510).\n- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).\n- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).\n- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).\n- tipc: fix a double kfree_skb() (networking-stable-19_01_04).\n- tipc: fix a race condition of releasing subscriber object (bsc#1051510).\n- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).\n- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).\n- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).\n- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).\n- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).\n- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).\n- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).\n- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).\n- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).\n- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).\n- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).\n- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).\n- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).\n- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).\n- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).\n- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).\n- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).\n- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).\n- uevent: add alloc_uevent_skb() helper (bsc#1122982).\n- uio_hv_generic: defer opening vmbus until first use (bsc#1127577).\n- uio_hv_generic: set callbacks on open (bsc#1127577).\n- uio: introduce UIO_MEM_IOVA (bsc#1127577).\n- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).\n- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).\n- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.\n- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).\n- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).\n- usb: Add new USB LPM helpers (bsc#1120902).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).\n- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).\n- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).\n- usb: dwc3: gadget: Clear req-\u003eneeds_extra_trb flag on cleanup (bsc#1120902).\n- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).\n- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).\n- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).\n- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).\n- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).\n- usb: musb: dsps: fix otg state machine (bsc#1051510).\n- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).\n- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).\n- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n- usb: phy: am335x: fix race condition in _probe (bsc#1051510).\n- usb: serial: option: add Fibocom NL678 series (bsc#1120902).\n- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).\n- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).\n- usb: storage: add quirk for SMI SM3350 (bsc#1120902).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).\n- usb: xhci: fix \u0027broken_suspend\u0027 placement in struct xchi_hcd (bsc#1119086).\n- veth: set peer GSO values (bsc#1051510).\n- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n- vfio: ccw: process ssch with interrupts disabled (git-fixes).\n- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).\n- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).\n- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).\n- vhost: log dirty page correctly (networking-stable-19_01_26).\n- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).\n- vhost/vsock: fix uninitialized vhost_vsock-\u003eguest_cid (bsc#1051510).\n- video: clps711x-fb: release disp device node in probe() (bsc#1051510).\n- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).\n- virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).\n- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).\n- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).\n- virtio/s390: avoid race on vcdev-\u003econfig (git-fixes).\n- virtio/s390: fix race in ccw_io_helper() (git-fixes).\n- vmbus: fix subchannel removal (bsc#1127577).\n- vmbus: keep pointer to ring buffer page (bsc#1127577).\n- vmbus: pass channel to hv_process_channel_removal (bsc#1127577).\n- vmbus: split ring buffer allocation from open (bsc#1127577).\n- VMCI: Support upto 64-bit PPNs (bsc#1127286).\n- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).\n- VSOCK: Send reset control packet when socket is partially bound (networking-stable-19_01_04).\n- vt: invoke notifier on screen size change (bsc#1051510).\n- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).\n- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling gro_cells_receive() (git-fixes).\n- vxlan: update skb dst pmtu on tx path (bsc#1123456).\n- w90p910_ether: remove incorrect __init annotation (bsc#1051510).\n- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).\n- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/amd_nb: Add PCI device IDs for family 17h, model 30h ().\n- x86/amd_nb: Add support for newer PCI topologies ().\n- x86/a.out: Clear the dump structure initially (bsc#1114279).\n- x86/apic: Provide apic_ack_irq() (bsc#1122822).\n- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).\n- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).\n- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).\n- x86/bugs: Add AMD\u0027s variant of SSB_NO (bsc#1114279).\n- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).\n- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).\n- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).\n- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).\n- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).\n- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).\n- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).\n- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).\n- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).\n- x86/vdso: Remove obsolete \u0027fake section table\u0027 reservation (bsc#1114279).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).\n- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).\n- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: fix dom0 boot on huge systems (bsc#1127836).\n- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).\n- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).\n- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).\n- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).\n- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).\n- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).\n- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).\n- Yama: Check for pid death before checking ancestry (bsc#1051510).\n- yam: fix a missing-check bug (bsc#1051510).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-767,SUSE-SLE-SERVER-12-SP4-2019-767", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0767-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0767-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190767-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0767-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050252", "url": "https://bugzilla.suse.com/1050252" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1054610", "url": "https://bugzilla.suse.com/1054610" }, { "category": "self", "summary": "SUSE Bug 1055121", "url": "https://bugzilla.suse.com/1055121" }, { "category": "self", "summary": "SUSE Bug 1056658", "url": "https://bugzilla.suse.com/1056658" }, { "category": "self", "summary": "SUSE Bug 1056662", "url": "https://bugzilla.suse.com/1056662" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1063638", "url": "https://bugzilla.suse.com/1063638" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1070995", "url": "https://bugzilla.suse.com/1070995" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1084216", "url": "https://bugzilla.suse.com/1084216" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1088133", "url": "https://bugzilla.suse.com/1088133" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098382", "url": "https://bugzilla.suse.com/1098382" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106434", "url": "https://bugzilla.suse.com/1106434" }, { "category": "self", "summary": "SUSE Bug 1106811", "url": "https://bugzilla.suse.com/1106811" }, { "category": "self", "summary": "SUSE Bug 1107078", "url": "https://bugzilla.suse.com/1107078" }, { "category": "self", "summary": "SUSE Bug 1107665", "url": "https://bugzilla.suse.com/1107665" }, { "category": "self", "summary": "SUSE Bug 1108101", "url": "https://bugzilla.suse.com/1108101" }, { "category": "self", "summary": "SUSE Bug 1108870", "url": "https://bugzilla.suse.com/1108870" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1110096", "url": "https://bugzilla.suse.com/1110096" }, { "category": "self", "summary": "SUSE Bug 1110705", "url": "https://bugzilla.suse.com/1110705" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1113042", "url": "https://bugzilla.suse.com/1113042" }, { "category": "self", "summary": "SUSE Bug 1113712", "url": "https://bugzilla.suse.com/1113712" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113939", "url": "https://bugzilla.suse.com/1113939" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114585", "url": "https://bugzilla.suse.com/1114585" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117155", "url": "https://bugzilla.suse.com/1117155" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1117947", "url": "https://bugzilla.suse.com/1117947" }, { "category": "self", "summary": "SUSE Bug 1118338", "url": "https://bugzilla.suse.com/1118338" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119086", "url": "https://bugzilla.suse.com/1119086" }, { "category": "self", "summary": "SUSE Bug 1119766", "url": "https://bugzilla.suse.com/1119766" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120008", "url": "https://bugzilla.suse.com/1120008" }, { "category": "self", "summary": "SUSE Bug 1120318", "url": "https://bugzilla.suse.com/1120318" }, { "category": "self", "summary": "SUSE Bug 1120601", "url": "https://bugzilla.suse.com/1120601" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120854", "url": "https://bugzilla.suse.com/1120854" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1120909", "url": "https://bugzilla.suse.com/1120909" }, { "category": "self", "summary": "SUSE Bug 1120955", "url": "https://bugzilla.suse.com/1120955" }, { "category": "self", "summary": "SUSE Bug 1121317", "url": "https://bugzilla.suse.com/1121317" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1121789", "url": "https://bugzilla.suse.com/1121789" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122159", "url": "https://bugzilla.suse.com/1122159" }, { "category": "self", "summary": "SUSE Bug 1122192", "url": "https://bugzilla.suse.com/1122192" }, { "category": "self", "summary": "SUSE Bug 1122324", "url": "https://bugzilla.suse.com/1122324" }, { "category": "self", "summary": "SUSE Bug 1122554", "url": "https://bugzilla.suse.com/1122554" }, { "category": "self", "summary": "SUSE Bug 1122662", "url": "https://bugzilla.suse.com/1122662" }, { "category": "self", "summary": "SUSE Bug 1122764", "url": "https://bugzilla.suse.com/1122764" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122822", "url": "https://bugzilla.suse.com/1122822" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1122927", "url": "https://bugzilla.suse.com/1122927" }, { "category": "self", "summary": "SUSE Bug 1122944", "url": "https://bugzilla.suse.com/1122944" }, { "category": "self", "summary": "SUSE Bug 1122971", "url": "https://bugzilla.suse.com/1122971" }, { "category": "self", "summary": "SUSE Bug 1122982", "url": "https://bugzilla.suse.com/1122982" }, { "category": "self", "summary": "SUSE Bug 1123060", "url": "https://bugzilla.suse.com/1123060" }, { "category": "self", "summary": "SUSE Bug 1123061", "url": "https://bugzilla.suse.com/1123061" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1123317", "url": "https://bugzilla.suse.com/1123317" }, { "category": "self", "summary": "SUSE Bug 1123348", "url": "https://bugzilla.suse.com/1123348" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE Bug 1123456", "url": "https://bugzilla.suse.com/1123456" }, { "category": "self", "summary": "SUSE Bug 1123538", "url": "https://bugzilla.suse.com/1123538" }, { "category": "self", "summary": "SUSE Bug 1123697", "url": "https://bugzilla.suse.com/1123697" }, { "category": "self", "summary": "SUSE Bug 1123882", "url": "https://bugzilla.suse.com/1123882" }, { "category": "self", "summary": "SUSE Bug 1123933", "url": "https://bugzilla.suse.com/1123933" }, { "category": "self", "summary": "SUSE Bug 1124055", "url": "https://bugzilla.suse.com/1124055" }, { "category": "self", "summary": "SUSE Bug 1124204", "url": "https://bugzilla.suse.com/1124204" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124579", "url": "https://bugzilla.suse.com/1124579" }, { "category": "self", "summary": "SUSE Bug 1124589", "url": "https://bugzilla.suse.com/1124589" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1124969", "url": "https://bugzilla.suse.com/1124969" }, { "category": "self", "summary": "SUSE Bug 1124974", "url": "https://bugzilla.suse.com/1124974" }, { "category": "self", "summary": "SUSE Bug 1124975", "url": "https://bugzilla.suse.com/1124975" }, { "category": "self", "summary": "SUSE Bug 1124976", "url": "https://bugzilla.suse.com/1124976" }, { "category": "self", "summary": "SUSE Bug 1124978", "url": "https://bugzilla.suse.com/1124978" }, { "category": "self", "summary": "SUSE Bug 1124979", "url": "https://bugzilla.suse.com/1124979" }, { "category": "self", "summary": "SUSE Bug 1124980", "url": "https://bugzilla.suse.com/1124980" }, { "category": "self", "summary": "SUSE Bug 1124981", "url": "https://bugzilla.suse.com/1124981" }, { "category": "self", "summary": "SUSE Bug 1124982", "url": "https://bugzilla.suse.com/1124982" }, { "category": "self", "summary": "SUSE Bug 1124984", "url": "https://bugzilla.suse.com/1124984" }, { "category": "self", "summary": "SUSE Bug 1124985", "url": "https://bugzilla.suse.com/1124985" }, { "category": "self", "summary": "SUSE Bug 1125109", "url": "https://bugzilla.suse.com/1125109" }, { "category": "self", "summary": "SUSE Bug 1125125", "url": "https://bugzilla.suse.com/1125125" }, { "category": "self", "summary": "SUSE Bug 1125252", "url": "https://bugzilla.suse.com/1125252" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125614", "url": "https://bugzilla.suse.com/1125614" }, { "category": "self", "summary": "SUSE Bug 1125728", "url": "https://bugzilla.suse.com/1125728" }, { "category": "self", "summary": "SUSE Bug 1125780", "url": "https://bugzilla.suse.com/1125780" }, { "category": "self", "summary": "SUSE Bug 1125797", "url": "https://bugzilla.suse.com/1125797" }, { "category": "self", "summary": "SUSE Bug 1125799", "url": "https://bugzilla.suse.com/1125799" }, { "category": "self", "summary": "SUSE Bug 1125800", "url": "https://bugzilla.suse.com/1125800" }, { "category": "self", "summary": "SUSE Bug 1125907", "url": "https://bugzilla.suse.com/1125907" }, { "category": "self", "summary": "SUSE Bug 1125947", "url": "https://bugzilla.suse.com/1125947" }, { "category": "self", "summary": "SUSE Bug 1126131", "url": "https://bugzilla.suse.com/1126131" }, { "category": "self", "summary": "SUSE Bug 1126209", "url": "https://bugzilla.suse.com/1126209" }, { "category": "self", "summary": "SUSE Bug 1126284", "url": "https://bugzilla.suse.com/1126284" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126393", "url": "https://bugzilla.suse.com/1126393" }, { "category": "self", "summary": "SUSE Bug 1126476", "url": "https://bugzilla.suse.com/1126476" }, { "category": "self", "summary": "SUSE Bug 1126480", "url": "https://bugzilla.suse.com/1126480" }, { "category": "self", "summary": "SUSE Bug 1126481", "url": "https://bugzilla.suse.com/1126481" }, { "category": "self", "summary": "SUSE Bug 1126488", "url": "https://bugzilla.suse.com/1126488" }, { "category": "self", "summary": "SUSE Bug 1126495", "url": "https://bugzilla.suse.com/1126495" }, { "category": "self", "summary": "SUSE Bug 1126555", "url": "https://bugzilla.suse.com/1126555" }, { "category": "self", "summary": "SUSE Bug 1126579", "url": "https://bugzilla.suse.com/1126579" }, { "category": "self", "summary": "SUSE Bug 1126789", "url": "https://bugzilla.suse.com/1126789" }, { "category": "self", "summary": "SUSE Bug 1126790", "url": "https://bugzilla.suse.com/1126790" }, { "category": "self", "summary": "SUSE Bug 1126802", "url": "https://bugzilla.suse.com/1126802" }, { "category": "self", "summary": "SUSE Bug 1126803", "url": "https://bugzilla.suse.com/1126803" }, { "category": "self", "summary": "SUSE Bug 1126804", "url": "https://bugzilla.suse.com/1126804" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1126806", "url": "https://bugzilla.suse.com/1126806" }, { "category": "self", "summary": "SUSE Bug 1126807", "url": "https://bugzilla.suse.com/1126807" }, { "category": "self", "summary": "SUSE Bug 1127042", "url": "https://bugzilla.suse.com/1127042" }, { "category": "self", "summary": "SUSE Bug 1127062", "url": "https://bugzilla.suse.com/1127062" }, { "category": "self", "summary": "SUSE Bug 1127081", "url": "https://bugzilla.suse.com/1127081" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127154", "url": "https://bugzilla.suse.com/1127154" }, { "category": "self", "summary": "SUSE Bug 1127285", "url": "https://bugzilla.suse.com/1127285" }, { "category": "self", "summary": "SUSE Bug 1127286", "url": "https://bugzilla.suse.com/1127286" }, { "category": "self", "summary": "SUSE Bug 1127307", "url": "https://bugzilla.suse.com/1127307" }, { "category": "self", "summary": "SUSE Bug 1127363", "url": "https://bugzilla.suse.com/1127363" }, { "category": "self", "summary": "SUSE Bug 1127493", "url": "https://bugzilla.suse.com/1127493" }, { "category": "self", "summary": "SUSE Bug 1127494", "url": "https://bugzilla.suse.com/1127494" }, { "category": "self", "summary": "SUSE Bug 1127495", "url": "https://bugzilla.suse.com/1127495" }, { "category": "self", "summary": "SUSE Bug 1127496", "url": "https://bugzilla.suse.com/1127496" }, { "category": "self", "summary": "SUSE Bug 1127497", "url": "https://bugzilla.suse.com/1127497" }, { "category": "self", "summary": "SUSE Bug 1127498", "url": "https://bugzilla.suse.com/1127498" }, { "category": "self", "summary": "SUSE Bug 1127534", "url": "https://bugzilla.suse.com/1127534" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127567", "url": "https://bugzilla.suse.com/1127567" }, { "category": "self", "summary": "SUSE Bug 1127577", "url": "https://bugzilla.suse.com/1127577" }, { "category": "self", "summary": "SUSE Bug 1127595", "url": "https://bugzilla.suse.com/1127595" }, { "category": "self", "summary": "SUSE Bug 1127603", "url": "https://bugzilla.suse.com/1127603" }, { "category": "self", "summary": "SUSE Bug 1127682", "url": "https://bugzilla.suse.com/1127682" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127750", "url": "https://bugzilla.suse.com/1127750" }, { "category": "self", "summary": "SUSE Bug 1127836", "url": "https://bugzilla.suse.com/1127836" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128094", "url": "https://bugzilla.suse.com/1128094" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128351", "url": "https://bugzilla.suse.com/1128351" }, { "category": "self", "summary": "SUSE Bug 1128378", "url": "https://bugzilla.suse.com/1128378" }, { "category": "self", "summary": "SUSE Bug 1128451", "url": "https://bugzilla.suse.com/1128451" }, { "category": "self", "summary": "SUSE Bug 1128895", "url": "https://bugzilla.suse.com/1128895" }, { "category": "self", "summary": "SUSE Bug 1129016", "url": "https://bugzilla.suse.com/1129016" }, { "category": "self", "summary": "SUSE Bug 1129046", "url": "https://bugzilla.suse.com/1129046" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129163", "url": "https://bugzilla.suse.com/1129163" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129181", "url": "https://bugzilla.suse.com/1129181" }, { "category": "self", "summary": "SUSE Bug 1129182", "url": "https://bugzilla.suse.com/1129182" }, { "category": "self", "summary": "SUSE Bug 1129183", "url": "https://bugzilla.suse.com/1129183" }, { "category": "self", "summary": "SUSE Bug 1129184", "url": "https://bugzilla.suse.com/1129184" }, { "category": "self", "summary": "SUSE Bug 1129205", "url": "https://bugzilla.suse.com/1129205" }, { "category": "self", "summary": "SUSE Bug 1129281", "url": "https://bugzilla.suse.com/1129281" }, { "category": "self", "summary": "SUSE Bug 1129284", "url": "https://bugzilla.suse.com/1129284" }, { "category": "self", "summary": "SUSE Bug 1129285", "url": "https://bugzilla.suse.com/1129285" }, { "category": "self", "summary": "SUSE Bug 1129291", "url": "https://bugzilla.suse.com/1129291" }, { "category": "self", "summary": "SUSE Bug 1129292", "url": "https://bugzilla.suse.com/1129292" }, { "category": "self", "summary": "SUSE Bug 1129293", "url": "https://bugzilla.suse.com/1129293" }, { "category": "self", "summary": "SUSE Bug 1129294", "url": "https://bugzilla.suse.com/1129294" }, { "category": "self", "summary": "SUSE Bug 1129295", "url": "https://bugzilla.suse.com/1129295" }, { "category": "self", "summary": "SUSE Bug 1129296", "url": "https://bugzilla.suse.com/1129296" }, { "category": "self", "summary": "SUSE Bug 1129326", "url": "https://bugzilla.suse.com/1129326" }, { "category": "self", "summary": "SUSE Bug 1129327", "url": "https://bugzilla.suse.com/1129327" }, { "category": "self", "summary": "SUSE Bug 1129330", "url": "https://bugzilla.suse.com/1129330" }, { "category": "self", "summary": "SUSE Bug 1129363", "url": "https://bugzilla.suse.com/1129363" }, { "category": "self", "summary": "SUSE Bug 1129366", "url": "https://bugzilla.suse.com/1129366" }, { "category": "self", "summary": "SUSE Bug 1129497", "url": "https://bugzilla.suse.com/1129497" }, { "category": "self", "summary": "SUSE Bug 1129519", "url": "https://bugzilla.suse.com/1129519" }, { "category": "self", "summary": "SUSE Bug 1129543", "url": "https://bugzilla.suse.com/1129543" }, { "category": "self", "summary": "SUSE Bug 1129547", "url": "https://bugzilla.suse.com/1129547" }, { "category": "self", "summary": "SUSE Bug 1129551", "url": "https://bugzilla.suse.com/1129551" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129625", "url": "https://bugzilla.suse.com/1129625" }, { "category": "self", "summary": "SUSE Bug 1129664", "url": "https://bugzilla.suse.com/1129664" }, { "category": "self", "summary": "SUSE Bug 1129739", "url": "https://bugzilla.suse.com/1129739" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 807502", "url": "https://bugzilla.suse.com/807502" }, { "category": "self", "summary": "SUSE Bug 828192", "url": "https://bugzilla.suse.com/828192" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20669 page", "url": "https://www.suse.com/security/cve/CVE-2018-20669/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7308 page", "url": "https://www.suse.com/security/cve/CVE-2019-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8980 page", "url": "https://www.suse.com/security/cve/CVE-2019-8980/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-03-27T09:34:13Z", "generator": { "date": "2019-03-27T09:34:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0767-1", "initial_release_date": "2019-03-27T09:34:13Z", "revision_history": [ { "date": "2019-03-27T09:34:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-6.9.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-6.9.1.noarch", "product_id": "kernel-devel-azure-4.12.14-6.9.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-6.9.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-6.9.1.noarch", "product_id": "kernel-source-azure-4.12.14-6.9.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-6.9.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-6.9.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-6.9.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-6.9.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-6.9.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-6.9.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-azure-4.12.14-6.9.1.x86_64", "product_id": "kernel-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-6.9.1.x86_64", "product_id": "kernel-azure-base-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-6.9.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-6.9.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-azure-kgraft-4.12.14-6.9.1.x86_64", "product_id": "kernel-azure-kgraft-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-6.9.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-6.9.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-6.9.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-6.9.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-6.9.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-6.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-6.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-6.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-6.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-6.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-6.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-6.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-6.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-6.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20669" } ], "notes": [ { "category": "general", "text": "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20669", "url": "https://www.suse.com/security/cve/CVE-2018-20669" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2018-20669", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "important" } ], "title": "CVE-2018-20669" }, { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-3819" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "important" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "important" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7308" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7308", "url": "https://www.suse.com/security/cve/CVE-2019-7308" }, { "category": "external", "summary": "SUSE Bug 1124055 for CVE-2019-7308", "url": "https://bugzilla.suse.com/1124055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "important" } ], "title": "CVE-2019-7308" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "important" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-8980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8980" } ], "notes": [ { "category": "general", "text": "A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8980", "url": "https://www.suse.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "SUSE Bug 1126209 for CVE-2019-8980", "url": "https://bugzilla.suse.com/1126209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "low" } ], "title": "CVE-2019-8980" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
suse-su-2019:0439-1
Vulnerability from csaf_suse
Published
2019-02-19 14:35
Modified
2019-02-19 14:35
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).
- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2018-16862: A security flaw was found in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108498).
- CVE-2019-3459, CVE-2019-3460: The Blutooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).
The following non-security bugs were fixed:
- aio: hold an extra file reference over AIO read/write operations (bsc#1116027).
- ata: Fix racy link clearance (bsc#1107866).
- btrfs: Fix wrong first_key parameter in replace_path (follow up fixes for bsc#1084721).
- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).
- cifs: Fix infinite loop when using hard mount option (bsc#1091171).
- dm round robin: revert 'use percpu 'repeat_count' and 'current_path'' (bsc#1113192)
- fscache: fix race between enablement and dropping of object (bsc#1107385).
- ibmvnic: fix index in release_rx_pools (bsc#1115440).
- ip: hash fragments consistently (bsc#1042286 bsc#1108145).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (bsc#1110286).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).
- ixgbe: Add function for checking to see if we can reuse page (bsc#1100105).
- ixgbe: Add support for build_skb (bsc#1100105).
- ixgbe: Add support for padding packet (bsc#1100105).
- ixgbe: Break out Rx buffer page management (bsc#1100105).
- ixgbe: Fix output from ixgbe_dump (bsc#1100105).
- ixgbe: Make use of order 1 pages and 3K buffers independent of FCoE (bsc#1100105).
- ixgbe: Only DMA sync frame length (bsc#1100105).
- ixgbe: Update code to better handle incrementing page count (bsc#1100105).
- ixgbe: Update driver to make use of DMA attributes in Rx path (bsc#1100105).
- ixgbe: Use length to determine if descriptor is done (bsc#1100105).
- libfc: sync strings with upstream versions (bsc#1114763).
- md: reorder flag_bits to match upstream commits The ordering in the patches was backward.
- mm: add support for releasing multiple instances of a page (bsc#1100105).
- mm: rename __page_frag functions to __page_frag_cache, drop order from drain (bsc#1100105).
- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).
- NFS: add nostatflush mount option (bsc#1065726).
- nospec: Include <asm/barrier.h> dependency (bsc#1114648).
- ovl: after setting xattributes, you need to copy the attributes in order to make sure the mode and ctime/mtime is set (bsc#1107299).
- powerpc/boot: Request no dynamic linker for boot wrapper (bsc#1070805).
- Revert 'kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)' This reverts commit 54da5757cbbb39ab15b3cd09cf922a8a9e32209c.
- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1042286 bsc#1108145).
- scsi: devinfo: apply to HP XP the same flags as Hitachi VSP (bnc#1091197).
- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1103624, bsc#1104731).
- sd: disable logical block provisioning if 'lpbme' is not set (bsc#1086095).
- tcp: prevent bogus FRTO undos with non-SACK flows (bsc#1086535).
- Update ibmvnic: Fix RX queue buffer cleanup (bsc#1115440, bsc#1115433).
- x86/asm/entry/32: Simplify pushes of zeroed pt_regs->REGs (bsc#1105931).
- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bsc#1105931).
- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).
- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).
- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555, bsc#1117187).
- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).
- xen/blkfront: correct purging of persistent grants (bnc#1065600).
- xen: fix race in xen_qlock_wait() (bnc#1107256).
- xen: fix xen_qlock_wait() (bnc#1107256).
- xen: make xen_qlock_wait() nestable (bnc#1107256).
- xen/netback: dont overflow meta array (bnc#1099523).
- xen/netfront: do not bug in case of too many frags (bnc#1012382).
- xen/netfront: do not cache skb_shinfo() (bnc#1012382).
- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).
- xfrm: use complete IPv6 addresses for hash (bsc#1109330).
- xfs/dmapi: restore event in xfs_getbmap (bsc#1095344, bsc#1114763).
- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).
Patchnames
SUSE-2019-439,SUSE-OpenStack-Cloud-7-2019-439,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-439,SUSE-SLE-HA-12-SP2-2019-439,SUSE-SLE-SAP-12-SP2-2019-439,SUSE-SLE-SERVER-12-SP2-2019-439,SUSE-SLE-SERVER-12-SP2-BCL-2019-439,SUSE-Storage-4-2019-439
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).\n- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).\n- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).\n- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).\n- CVE-2018-16862: A security flaw was found in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).\n- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).\n- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).\n- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108498).\n- CVE-2019-3459, CVE-2019-3460: The Blutooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n\nThe following non-security bugs were fixed:\n\n- aio: hold an extra file reference over AIO read/write operations (bsc#1116027).\n- ata: Fix racy link clearance (bsc#1107866).\n- btrfs: Fix wrong first_key parameter in replace_path (follow up fixes for bsc#1084721).\n- cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).\n- cifs: Fix infinite loop when using hard mount option (bsc#1091171).\n- dm round robin: revert \u0027use percpu \u0027repeat_count\u0027 and \u0027current_path\u0027\u0027 (bsc#1113192)\n- fscache: fix race between enablement and dropping of object (bsc#1107385).\n- ibmvnic: fix index in release_rx_pools (bsc#1115440).\n- ip: hash fragments consistently (bsc#1042286 bsc#1108145).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (bsc#1110286).\n- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).\n- ipv6: set rt6i_protocol properly in the route when it is installed (bsc#1114190).\n- ixgbe: Add function for checking to see if we can reuse page (bsc#1100105).\n- ixgbe: Add support for build_skb (bsc#1100105).\n- ixgbe: Add support for padding packet (bsc#1100105).\n- ixgbe: Break out Rx buffer page management (bsc#1100105).\n- ixgbe: Fix output from ixgbe_dump (bsc#1100105).\n- ixgbe: Make use of order 1 pages and 3K buffers independent of FCoE (bsc#1100105).\n- ixgbe: Only DMA sync frame length (bsc#1100105).\n- ixgbe: Update code to better handle incrementing page count (bsc#1100105).\n- ixgbe: Update driver to make use of DMA attributes in Rx path (bsc#1100105).\n- ixgbe: Use length to determine if descriptor is done (bsc#1100105).\n- libfc: sync strings with upstream versions (bsc#1114763).\n- md: reorder flag_bits to match upstream commits The ordering in the patches was backward.\n- mm: add support for releasing multiple instances of a page (bsc#1100105).\n- mm: rename __page_frag functions to __page_frag_cache, drop order from drain (bsc#1100105).\n- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).\n- NFS: add nostatflush mount option (bsc#1065726).\n- nospec: Include \u003casm/barrier.h\u003e dependency (bsc#1114648).\n- ovl: after setting xattributes, you need to copy the attributes in order to make sure the mode and ctime/mtime is set (bsc#1107299).\n- powerpc/boot: Request no dynamic linker for boot wrapper (bsc#1070805).\n- Revert \u0027kabi/severities: Ignore missing cpu_tss_tramp (bsc#1099597)\u0027 This reverts commit 54da5757cbbb39ab15b3cd09cf922a8a9e32209c.\n- rps: flow_dissector: Fix uninitialized flow_keys used in __skb_get_hash possibly (bsc#1042286 bsc#1108145).\n- scsi: devinfo: apply to HP XP the same flags as Hitachi VSP (bnc#1091197).\n- scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1103624, bsc#1104731).\n- sd: disable logical block provisioning if \u0027lpbme\u0027 is not set (bsc#1086095).\n- tcp: prevent bogus FRTO undos with non-SACK flows (bsc#1086535).\n- Update ibmvnic: Fix RX queue buffer cleanup (bsc#1115440, bsc#1115433).\n- x86/asm/entry/32: Simplify pushes of zeroed pt_regs-\u003eREGs (bsc#1105931).\n- x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).\n- x86/entry/64/compat: Clear registers for compat syscalls, to reduce speculation attack surface (bsc#1105931).\n- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).\n- x86/kaiser: Avoid loosing NMIs when using trampoline stack (bsc#1106293 bsc#1099597).\n- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555, bsc#1117187).\n- xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).\n- xen/blkfront: correct purging of persistent grants (bnc#1065600).\n- xen: fix race in xen_qlock_wait() (bnc#1107256).\n- xen: fix xen_qlock_wait() (bnc#1107256).\n- xen: make xen_qlock_wait() nestable (bnc#1107256).\n- xen/netback: dont overflow meta array (bnc#1099523).\n- xen/netfront: do not bug in case of too many frags (bnc#1012382).\n- xen/netfront: do not cache skb_shinfo() (bnc#1012382).\n- xen/x86: add diagnostic printout to xen_mc_flush() in case of error (bnc#1116183).\n- xfrm: use complete IPv6 addresses for hash (bsc#1109330).\n- xfs/dmapi: restore event in xfs_getbmap (bsc#1095344, bsc#1114763).\n- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-439,SUSE-OpenStack-Cloud-7-2019-439,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-439,SUSE-SLE-HA-12-SP2-2019-439,SUSE-SLE-SAP-12-SP2-2019-439,SUSE-SLE-SERVER-12-SP2-2019-439,SUSE-SLE-SERVER-12-SP2-BCL-2019-439,SUSE-Storage-4-2019-439", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0439-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0439-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190439-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0439-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-February/005138.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1023175", "url": "https://bugzilla.suse.com/1023175" }, { "category": "self", "summary": "SUSE Bug 1042286", "url": "https://bugzilla.suse.com/1042286" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1065726", "url": "https://bugzilla.suse.com/1065726" }, { "category": "self", "summary": "SUSE Bug 1070805", "url": "https://bugzilla.suse.com/1070805" }, { "category": "self", "summary": "SUSE Bug 1084721", "url": "https://bugzilla.suse.com/1084721" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086535", "url": "https://bugzilla.suse.com/1086535" }, { "category": "self", "summary": "SUSE Bug 1091158", "url": "https://bugzilla.suse.com/1091158" }, { "category": "self", "summary": "SUSE Bug 1091171", "url": "https://bugzilla.suse.com/1091171" }, { "category": "self", "summary": "SUSE Bug 1091197", "url": "https://bugzilla.suse.com/1091197" }, { "category": "self", "summary": "SUSE Bug 1094825", "url": "https://bugzilla.suse.com/1094825" }, { "category": "self", "summary": "SUSE Bug 1095344", "url": "https://bugzilla.suse.com/1095344" }, { "category": "self", "summary": "SUSE Bug 1098996", "url": "https://bugzilla.suse.com/1098996" }, { "category": "self", "summary": "SUSE Bug 1099523", "url": "https://bugzilla.suse.com/1099523" }, { "category": "self", "summary": "SUSE Bug 1099597", "url": "https://bugzilla.suse.com/1099597" }, { "category": "self", "summary": "SUSE Bug 1100105", "url": "https://bugzilla.suse.com/1100105" }, { "category": "self", "summary": "SUSE Bug 1101555", "url": "https://bugzilla.suse.com/1101555" }, { "category": "self", "summary": "SUSE Bug 1103624", "url": "https://bugzilla.suse.com/1103624" }, { "category": "self", "summary": "SUSE Bug 1104731", "url": "https://bugzilla.suse.com/1104731" }, { "category": "self", "summary": "SUSE Bug 1105025", "url": "https://bugzilla.suse.com/1105025" }, { "category": "self", "summary": "SUSE Bug 1105931", "url": "https://bugzilla.suse.com/1105931" }, { "category": "self", "summary": "SUSE Bug 1106293", "url": "https://bugzilla.suse.com/1106293" }, { "category": "self", "summary": "SUSE Bug 1107256", "url": "https://bugzilla.suse.com/1107256" }, { "category": "self", "summary": "SUSE Bug 1107299", "url": "https://bugzilla.suse.com/1107299" }, { "category": "self", "summary": "SUSE Bug 1107385", "url": "https://bugzilla.suse.com/1107385" }, { "category": "self", "summary": "SUSE Bug 1107866", "url": "https://bugzilla.suse.com/1107866" }, { "category": "self", "summary": "SUSE Bug 1108145", "url": "https://bugzilla.suse.com/1108145" }, { "category": "self", "summary": "SUSE Bug 1108498", "url": "https://bugzilla.suse.com/1108498" }, { "category": "self", "summary": "SUSE Bug 1109330", "url": "https://bugzilla.suse.com/1109330" }, { "category": "self", "summary": "SUSE Bug 1110286", "url": "https://bugzilla.suse.com/1110286" }, { "category": "self", "summary": "SUSE Bug 1110837", "url": "https://bugzilla.suse.com/1110837" }, { "category": "self", "summary": "SUSE Bug 1111062", "url": "https://bugzilla.suse.com/1111062" }, { "category": "self", "summary": "SUSE Bug 1113192", "url": "https://bugzilla.suse.com/1113192" }, { "category": "self", "summary": "SUSE Bug 1113751", "url": "https://bugzilla.suse.com/1113751" }, { "category": "self", "summary": "SUSE Bug 1113769", "url": "https://bugzilla.suse.com/1113769" }, { "category": "self", "summary": "SUSE Bug 1114190", "url": "https://bugzilla.suse.com/1114190" }, { "category": "self", "summary": "SUSE Bug 1114648", "url": "https://bugzilla.suse.com/1114648" }, { "category": "self", "summary": "SUSE Bug 1114763", "url": "https://bugzilla.suse.com/1114763" }, { "category": "self", "summary": "SUSE Bug 1115433", "url": "https://bugzilla.suse.com/1115433" }, { "category": "self", "summary": "SUSE Bug 1115440", "url": "https://bugzilla.suse.com/1115440" }, { "category": "self", "summary": "SUSE Bug 1116027", "url": "https://bugzilla.suse.com/1116027" }, { "category": "self", "summary": "SUSE Bug 1116183", "url": "https://bugzilla.suse.com/1116183" }, { "category": "self", "summary": "SUSE Bug 1116345", "url": "https://bugzilla.suse.com/1116345" }, { "category": "self", "summary": "SUSE Bug 1117186", "url": "https://bugzilla.suse.com/1117186" }, { "category": "self", "summary": "SUSE Bug 1117187", "url": "https://bugzilla.suse.com/1117187" }, { "category": "self", "summary": "SUSE Bug 1118152", "url": "https://bugzilla.suse.com/1118152" }, { "category": "self", "summary": "SUSE Bug 1118319", "url": "https://bugzilla.suse.com/1118319" }, { "category": "self", "summary": "SUSE Bug 1119714", "url": "https://bugzilla.suse.com/1119714" }, { "category": "self", "summary": "SUSE Bug 1119946", "url": "https://bugzilla.suse.com/1119946" }, { "category": "self", "summary": "SUSE Bug 1119947", "url": "https://bugzilla.suse.com/1119947" }, { "category": "self", "summary": "SUSE Bug 1120743", "url": "https://bugzilla.suse.com/1120743" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1121621", "url": "https://bugzilla.suse.com/1121621" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16862 page", "url": "https://www.suse.com/security/cve/CVE-2018-16862/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16884 page", "url": "https://www.suse.com/security/cve/CVE-2018-16884/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18281 page", "url": "https://www.suse.com/security/cve/CVE-2018-18281/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18386 page", "url": "https://www.suse.com/security/cve/CVE-2018-18386/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18690 page", "url": "https://www.suse.com/security/cve/CVE-2018-18690/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18710 page", "url": "https://www.suse.com/security/cve/CVE-2018-18710/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19824 page", "url": "https://www.suse.com/security/cve/CVE-2018-19824/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19985 page", "url": "https://www.suse.com/security/cve/CVE-2018-19985/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20169 page", "url": "https://www.suse.com/security/cve/CVE-2018-20169/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-9516 page", "url": "https://www.suse.com/security/cve/CVE-2018-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-9568 page", "url": "https://www.suse.com/security/cve/CVE-2018-9568/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-02-19T14:35:53Z", "generator": { "date": "2019-02-19T14:35:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0439-1", "initial_release_date": "2019-02-19T14:35:53Z", "revision_history": [ { "date": "2019-02-19T14:35:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.101.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.101.1.aarch64", "product_id": "cluster-md-kmp-default-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.101.1.aarch64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.101.1.aarch64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.101.1.aarch64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.101.1.aarch64", "product_id": "cluster-network-kmp-default-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.101.1.aarch64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.101.1.aarch64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.101.1.aarch64", "product": { "name": "dlm-kmp-default-4.4.121-92.101.1.aarch64", "product_id": "dlm-kmp-default-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.101.1.aarch64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.101.1.aarch64", "product_id": "dlm-kmp-vanilla-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.101.1.aarch64", "product": { "name": "gfs2-kmp-default-4.4.121-92.101.1.aarch64", "product_id": "gfs2-kmp-default-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.101.1.aarch64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.101.1.aarch64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.101.1.aarch64", "product": { "name": "kernel-default-4.4.121-92.101.1.aarch64", "product_id": "kernel-default-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.101.1.aarch64", "product": { "name": "kernel-default-base-4.4.121-92.101.1.aarch64", "product_id": "kernel-default-base-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.101.1.aarch64", "product": { "name": "kernel-default-devel-4.4.121-92.101.1.aarch64", "product_id": "kernel-default-devel-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.101.1.aarch64", "product": { "name": "kernel-default-extra-4.4.121-92.101.1.aarch64", "product_id": "kernel-default-extra-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.101.1.aarch64", "product": { "name": "kernel-default-kgraft-4.4.121-92.101.1.aarch64", "product_id": "kernel-default-kgraft-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.101.1.aarch64", "product": { "name": "kernel-obs-build-4.4.121-92.101.1.aarch64", "product_id": "kernel-obs-build-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.101.1.aarch64", "product": { "name": "kernel-obs-qa-4.4.121-92.101.1.aarch64", "product_id": "kernel-obs-qa-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.101.1.aarch64", "product": { "name": "kernel-syms-4.4.121-92.101.1.aarch64", "product_id": "kernel-syms-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.101.1.aarch64", "product": { "name": "kernel-vanilla-4.4.121-92.101.1.aarch64", "product_id": "kernel-vanilla-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.101.1.aarch64", "product": { "name": "kernel-vanilla-base-4.4.121-92.101.1.aarch64", "product_id": "kernel-vanilla-base-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.101.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.101.1.aarch64", "product_id": "kernel-vanilla-devel-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.101.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.101.1.aarch64", "product_id": "ocfs2-kmp-default-4.4.121-92.101.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.101.1.aarch64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.101.1.aarch64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.101.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.4.121-92.101.1.noarch", "product": { "name": "kernel-devel-4.4.121-92.101.1.noarch", "product_id": "kernel-devel-4.4.121-92.101.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.4.121-92.101.1.noarch", "product": { "name": "kernel-docs-4.4.121-92.101.1.noarch", "product_id": "kernel-docs-4.4.121-92.101.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.4.121-92.101.1.noarch", "product": { "name": "kernel-docs-html-4.4.121-92.101.1.noarch", "product_id": "kernel-docs-html-4.4.121-92.101.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-pdf-4.4.121-92.101.1.noarch", "product": { "name": "kernel-docs-pdf-4.4.121-92.101.1.noarch", "product_id": "kernel-docs-pdf-4.4.121-92.101.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.4.121-92.101.1.noarch", "product": { "name": "kernel-macros-4.4.121-92.101.1.noarch", "product_id": "kernel-macros-4.4.121-92.101.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.4.121-92.101.1.noarch", "product": { "name": "kernel-source-4.4.121-92.101.1.noarch", "product_id": "kernel-source-4.4.121-92.101.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.4.121-92.101.1.noarch", "product": { "name": "kernel-source-vanilla-4.4.121-92.101.1.noarch", "product_id": "kernel-source-vanilla-4.4.121-92.101.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.101.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.101.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "product_id": "cluster-md-kmp-default-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.101.1.ppc64le", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.101.1.ppc64le", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.101.1.ppc64le", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.101.1.ppc64le", "product_id": "cluster-network-kmp-debug-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "product": { "name": "cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "product_id": "cluster-network-kmp-default-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.101.1.ppc64le", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.101.1.ppc64le", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.101.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.4.121-92.101.1.ppc64le", "product_id": "dlm-kmp-debug-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.101.1.ppc64le", "product": { "name": "dlm-kmp-default-4.4.121-92.101.1.ppc64le", "product_id": "dlm-kmp-default-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.101.1.ppc64le", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.101.1.ppc64le", "product_id": "dlm-kmp-vanilla-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.101.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.4.121-92.101.1.ppc64le", "product_id": "gfs2-kmp-debug-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "product_id": "gfs2-kmp-default-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.101.1.ppc64le", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.101.1.ppc64le", "product_id": "gfs2-kmp-vanilla-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-debug-4.4.121-92.101.1.ppc64le", "product_id": "kernel-debug-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-debug-base-4.4.121-92.101.1.ppc64le", "product_id": "kernel-debug-base-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-debug-devel-4.4.121-92.101.1.ppc64le", "product_id": "kernel-debug-devel-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-debug-extra-4.4.121-92.101.1.ppc64le", "product_id": "kernel-debug-extra-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.4.121-92.101.1.ppc64le", "product_id": "kernel-debug-kgraft-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-default-4.4.121-92.101.1.ppc64le", "product_id": "kernel-default-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-default-base-4.4.121-92.101.1.ppc64le", "product_id": "kernel-default-base-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-default-devel-4.4.121-92.101.1.ppc64le", "product_id": "kernel-default-devel-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-default-extra-4.4.121-92.101.1.ppc64le", "product_id": "kernel-default-extra-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.4.121-92.101.1.ppc64le", "product_id": "kernel-default-kgraft-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-obs-build-4.4.121-92.101.1.ppc64le", "product_id": "kernel-obs-build-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-obs-qa-4.4.121-92.101.1.ppc64le", "product_id": "kernel-obs-qa-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-syms-4.4.121-92.101.1.ppc64le", "product_id": "kernel-syms-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-vanilla-4.4.121-92.101.1.ppc64le", "product_id": "kernel-vanilla-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.4.121-92.101.1.ppc64le", "product_id": "kernel-vanilla-base-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.101.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.4.121-92.101.1.ppc64le", "product_id": "kernel-vanilla-devel-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "product": { "name": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "product_id": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.101.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.101.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "product_id": "ocfs2-kmp-default-4.4.121-92.101.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.101.1.ppc64le", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.101.1.ppc64le", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.101.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.101.1.s390x", "product": { "name": "cluster-md-kmp-default-4.4.121-92.101.1.s390x", "product_id": "cluster-md-kmp-default-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.101.1.s390x", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.101.1.s390x", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.101.1.s390x", "product": { "name": "cluster-network-kmp-default-4.4.121-92.101.1.s390x", "product_id": "cluster-network-kmp-default-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.101.1.s390x", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.101.1.s390x", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.101.1.s390x", "product": { "name": "dlm-kmp-default-4.4.121-92.101.1.s390x", "product_id": "dlm-kmp-default-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.101.1.s390x", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.101.1.s390x", "product_id": "dlm-kmp-vanilla-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.101.1.s390x", "product": { "name": "gfs2-kmp-default-4.4.121-92.101.1.s390x", "product_id": "gfs2-kmp-default-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.101.1.s390x", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.101.1.s390x", "product_id": "gfs2-kmp-vanilla-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.101.1.s390x", "product": { "name": "kernel-default-4.4.121-92.101.1.s390x", "product_id": "kernel-default-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.101.1.s390x", "product": { "name": "kernel-default-base-4.4.121-92.101.1.s390x", "product_id": "kernel-default-base-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.101.1.s390x", "product": { "name": "kernel-default-devel-4.4.121-92.101.1.s390x", "product_id": "kernel-default-devel-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.101.1.s390x", "product": { "name": "kernel-default-extra-4.4.121-92.101.1.s390x", "product_id": "kernel-default-extra-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.101.1.s390x", "product": { "name": "kernel-default-kgraft-4.4.121-92.101.1.s390x", "product_id": "kernel-default-kgraft-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.4.121-92.101.1.s390x", "product": { "name": "kernel-default-man-4.4.121-92.101.1.s390x", "product_id": "kernel-default-man-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.101.1.s390x", "product": { "name": "kernel-obs-build-4.4.121-92.101.1.s390x", "product_id": "kernel-obs-build-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.101.1.s390x", "product": { "name": "kernel-obs-qa-4.4.121-92.101.1.s390x", "product_id": "kernel-obs-qa-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.101.1.s390x", "product": { "name": "kernel-syms-4.4.121-92.101.1.s390x", "product_id": "kernel-syms-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.101.1.s390x", "product": { "name": "kernel-vanilla-4.4.121-92.101.1.s390x", "product_id": "kernel-vanilla-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.101.1.s390x", "product": { "name": "kernel-vanilla-base-4.4.121-92.101.1.s390x", "product_id": "kernel-vanilla-base-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.101.1.s390x", "product": { "name": "kernel-vanilla-devel-4.4.121-92.101.1.s390x", "product_id": "kernel-vanilla-devel-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.4.121-92.101.1.s390x", "product": { "name": "kernel-zfcpdump-4.4.121-92.101.1.s390x", "product_id": "kernel-zfcpdump-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.101.1.s390x", "product": { "name": "ocfs2-kmp-default-4.4.121-92.101.1.s390x", "product_id": "ocfs2-kmp-default-4.4.121-92.101.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.101.1.s390x", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.101.1.s390x", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.101.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.4.121-92.101.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.4.121-92.101.1.x86_64", "product_id": "cluster-md-kmp-debug-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "product_id": "cluster-md-kmp-default-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-vanilla-4.4.121-92.101.1.x86_64", "product": { "name": "cluster-md-kmp-vanilla-4.4.121-92.101.1.x86_64", "product_id": "cluster-md-kmp-vanilla-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-debug-4.4.121-92.101.1.x86_64", "product": { "name": "cluster-network-kmp-debug-4.4.121-92.101.1.x86_64", "product_id": "cluster-network-kmp-debug-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "product": { "name": "cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "product_id": "cluster-network-kmp-default-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "cluster-network-kmp-vanilla-4.4.121-92.101.1.x86_64", "product": { "name": "cluster-network-kmp-vanilla-4.4.121-92.101.1.x86_64", "product_id": "cluster-network-kmp-vanilla-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.4.121-92.101.1.x86_64", "product": { "name": "dlm-kmp-debug-4.4.121-92.101.1.x86_64", "product_id": "dlm-kmp-debug-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.4.121-92.101.1.x86_64", "product": { "name": "dlm-kmp-default-4.4.121-92.101.1.x86_64", "product_id": "dlm-kmp-default-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-vanilla-4.4.121-92.101.1.x86_64", "product": { "name": "dlm-kmp-vanilla-4.4.121-92.101.1.x86_64", "product_id": "dlm-kmp-vanilla-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.4.121-92.101.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.4.121-92.101.1.x86_64", "product_id": "gfs2-kmp-debug-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.4.121-92.101.1.x86_64", "product": { "name": "gfs2-kmp-default-4.4.121-92.101.1.x86_64", "product_id": "gfs2-kmp-default-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-vanilla-4.4.121-92.101.1.x86_64", "product": { "name": "gfs2-kmp-vanilla-4.4.121-92.101.1.x86_64", "product_id": "gfs2-kmp-vanilla-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-debug-4.4.121-92.101.1.x86_64", "product_id": "kernel-debug-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-debug-base-4.4.121-92.101.1.x86_64", "product_id": "kernel-debug-base-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-debug-devel-4.4.121-92.101.1.x86_64", "product_id": "kernel-debug-devel-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-debug-extra-4.4.121-92.101.1.x86_64", "product_id": "kernel-debug-extra-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.4.121-92.101.1.x86_64", "product_id": "kernel-debug-kgraft-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-default-4.4.121-92.101.1.x86_64", "product_id": "kernel-default-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-default-base-4.4.121-92.101.1.x86_64", "product_id": "kernel-default-base-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-default-devel-4.4.121-92.101.1.x86_64", "product_id": "kernel-default-devel-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-default-extra-4.4.121-92.101.1.x86_64", "product_id": "kernel-default-extra-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-default-kgraft-4.4.121-92.101.1.x86_64", "product_id": "kernel-default-kgraft-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-obs-build-4.4.121-92.101.1.x86_64", "product_id": "kernel-obs-build-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-obs-qa-4.4.121-92.101.1.x86_64", "product_id": "kernel-obs-qa-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-syms-4.4.121-92.101.1.x86_64", "product_id": "kernel-syms-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-vanilla-4.4.121-92.101.1.x86_64", "product_id": "kernel-vanilla-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-vanilla-base-4.4.121-92.101.1.x86_64", "product_id": "kernel-vanilla-base-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.4.121-92.101.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.4.121-92.101.1.x86_64", "product_id": "kernel-vanilla-devel-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "product": { "name": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "product_id": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.4.121-92.101.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.4.121-92.101.1.x86_64", "product_id": "ocfs2-kmp-debug-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "product_id": "ocfs2-kmp-default-4.4.121-92.101.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-vanilla-4.4.121-92.101.1.x86_64", "product": { "name": "ocfs2-kmp-vanilla-4.4.121-92.101.1.x86_64", "product_id": "ocfs2-kmp-vanilla-4.4.121-92.101.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE OpenStack Cloud 7", "product": { "name": "SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7", "product_identification_helper": { "cpe": "cpe:/o:suse:suse-openstack-cloud:7" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp2" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product": { "name": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-bcl:12:sp2" } } }, { "category": "product_name", "name": "SUSE Enterprise Storage 4", "product": { "name": "SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4", "product_identification_helper": { "cpe": "cpe:/o:suse:ses:4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.101.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.101.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.101.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.101.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.101.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.101.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.101.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.101.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.101.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.101.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.101.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.101.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.101.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.101.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.101.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.101.1.noarch as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.101.1.noarch", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.101.1.s390x as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.101.1.s390x", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.101.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64 as component of SUSE OpenStack Cloud 7", "product_id": "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE OpenStack Cloud 7" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-network-kmp-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64" }, "product_reference": "cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.4.121-92.101.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x" }, "product_reference": "dlm-kmp-default-4.4.121-92.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64" }, "product_reference": "dlm-kmp-default-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x" }, "product_reference": "gfs2-kmp-default-4.4.121-92.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP2", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.101.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.101.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.101.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.101.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.101.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.101.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.101.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le" }, "product_reference": "kernel-default-4.4.121-92.101.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x" }, "product_reference": "kernel-default-4.4.121-92.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le" }, "product_reference": "kernel-default-base-4.4.121-92.101.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x" }, "product_reference": "kernel-default-base-4.4.121-92.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le" }, "product_reference": "kernel-default-devel-4.4.121-92.101.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x" }, "product_reference": "kernel-default-devel-4.4.121-92.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x" }, "product_reference": "kernel-default-man-4.4.121-92.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.101.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.101.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.101.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.101.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le" }, "product_reference": "kernel-syms-4.4.121-92.101.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.101.1.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x" }, "product_reference": "kernel-syms-4.4.121-92.101.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le" }, "product_reference": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.101.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.101.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.101.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.101.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.101.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL", "product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.4.121-92.101.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-default-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.4.121-92.101.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-default-base-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.4.121-92.101.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-default-devel-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.4.121-92.101.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch" }, "product_reference": "kernel-devel-4.4.121-92.101.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.4.121-92.101.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch" }, "product_reference": "kernel-macros-4.4.121-92.101.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.4.121-92.101.1.noarch as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch" }, "product_reference": "kernel-source-4.4.121-92.101.1.noarch", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.4.121-92.101.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64" }, "product_reference": "kernel-syms-4.4.121-92.101.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64 as component of SUSE Enterprise Storage 4", "product_id": "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" }, "product_reference": "kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "relates_to_product_reference": "SUSE Enterprise Storage 4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-16862", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16862" } ], "notes": [ { "category": "general", "text": "A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16862", "url": "https://www.suse.com/security/cve/CVE-2018-16862" }, { "category": "external", "summary": "SUSE Bug 1117186 for CVE-2018-16862", "url": "https://bugzilla.suse.com/1117186" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-19T14:35:53Z", "details": "moderate" } ], "title": "CVE-2018-16862" }, { "cve": "CVE-2018-16884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16884" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16884", "url": "https://www.suse.com/security/cve/CVE-2018-16884" }, { "category": "external", "summary": "SUSE Bug 1119946 for CVE-2018-16884", "url": "https://bugzilla.suse.com/1119946" }, { "category": "external", "summary": "SUSE Bug 1119947 for CVE-2018-16884", "url": "https://bugzilla.suse.com/1119947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-19T14:35:53Z", "details": "important" } ], "title": "CVE-2018-16884" }, { "cve": "CVE-2018-18281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18281" } ], "notes": [ { "category": "general", "text": "Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18281", "url": "https://www.suse.com/security/cve/CVE-2018-18281" }, { "category": "external", "summary": "SUSE Bug 1113769 for CVE-2018-18281", "url": "https://bugzilla.suse.com/1113769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-19T14:35:53Z", "details": "moderate" } ], "title": "CVE-2018-18281" }, { "cve": "CVE-2018-18386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18386" } ], "notes": [ { "category": "general", "text": "drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18386", "url": "https://www.suse.com/security/cve/CVE-2018-18386" }, { "category": "external", "summary": "SUSE Bug 1094825 for CVE-2018-18386", "url": "https://bugzilla.suse.com/1094825" }, { "category": "external", "summary": "SUSE Bug 1112039 for CVE-2018-18386", "url": "https://bugzilla.suse.com/1112039" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-19T14:35:53Z", "details": "moderate" } ], "title": "CVE-2018-18386" }, { "cve": "CVE-2018-18690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18690" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18690", "url": "https://www.suse.com/security/cve/CVE-2018-18690" }, { "category": "external", "summary": "SUSE Bug 1105025 for CVE-2018-18690", "url": "https://bugzilla.suse.com/1105025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-19T14:35:53Z", "details": "moderate" } ], "title": "CVE-2018-18690" }, { "cve": "CVE-2018-18710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18710" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18710", "url": "https://www.suse.com/security/cve/CVE-2018-18710" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-18710", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-19T14:35:53Z", "details": "moderate" } ], "title": "CVE-2018-18710" }, { "cve": "CVE-2018-19824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19824" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19824", "url": "https://www.suse.com/security/cve/CVE-2018-19824" }, { "category": "external", "summary": "SUSE Bug 1118152 for CVE-2018-19824", "url": "https://bugzilla.suse.com/1118152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-19T14:35:53Z", "details": "moderate" } ], "title": "CVE-2018-19824" }, { "cve": "CVE-2018-19985", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19985" } ], "notes": [ { "category": "general", "text": "The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19985", "url": "https://www.suse.com/security/cve/CVE-2018-19985" }, { "category": "external", "summary": "SUSE Bug 1120743 for CVE-2018-19985", "url": "https://bugzilla.suse.com/1120743" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-19T14:35:53Z", "details": "low" } ], "title": "CVE-2018-19985" }, { "cve": "CVE-2018-20169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20169" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20169", "url": "https://www.suse.com/security/cve/CVE-2018-20169" }, { "category": "external", "summary": "SUSE Bug 1119714 for CVE-2018-20169", "url": "https://bugzilla.suse.com/1119714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-19T14:35:53Z", "details": "moderate" } ], "title": "CVE-2018-20169" }, { "cve": "CVE-2018-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-9516" } ], "notes": [ { "category": "general", "text": "In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-9516", "url": "https://www.suse.com/security/cve/CVE-2018-9516" }, { "category": "external", "summary": "SUSE Bug 1108498 for CVE-2018-9516", "url": "https://bugzilla.suse.com/1108498" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2018-9516", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-19T14:35:53Z", "details": "moderate" } ], "title": "CVE-2018-9516" }, { "cve": "CVE-2018-9568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-9568" } ], "notes": [ { "category": "general", "text": "In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-9568", "url": "https://www.suse.com/security/cve/CVE-2018-9568" }, { "category": "external", "summary": "SUSE Bug 1118319 for CVE-2018-9568", "url": "https://bugzilla.suse.com/1118319" }, { "category": "external", "summary": "SUSE Bug 1118320 for CVE-2018-9568", "url": "https://bugzilla.suse.com/1118320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-19T14:35:53Z", "details": "important" } ], "title": "CVE-2018-9568" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-19T14:35:53Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Enterprise Storage 4:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-source-4.4.121-92.101.1.noarch", "SUSE Enterprise Storage 4:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Enterprise Storage 4:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-md-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:cluster-network-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:dlm-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:gfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP2:ocfs2-kmp-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.s390x", "SUSE Linux Enterprise Server 12 SP2-LTSS:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server 12 SP2-LTSS:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-devel-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-macros-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-source-4.4.121-92.101.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP2:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-base-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-default-devel-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kernel-default-man-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-devel-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-macros-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-source-4.4.121-92.101.1.noarch", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.s390x", "SUSE OpenStack Cloud 7:kernel-syms-4.4.121-92.101.1.x86_64", "SUSE OpenStack Cloud 7:kgraft-patch-4_4_121-92_101-default-1-3.3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-02-19T14:35:53Z", "details": "moderate" } ], "title": "CVE-2019-3460" } ] }
suse-su-2019:0765-1
Vulnerability from csaf_suse
Published
2019-03-26 17:00
Modified
2019-03-26 17:00
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks. (bnc#1122971).
- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).
- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ('root') can cause a system lock up and a denial of service. (bnc#1123161).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728 ).
- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).
- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host's stack memory contents to a guest (bsc#1124735).
- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).
- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).
- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
The following non-security bugs were fixed:
- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).
- 9p: clear dangling pointers in p9stat_free (bsc#1051510).
- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).
- 9p/net: fix memory leak in p9_client_create (bsc#1051510).
- 9p/net: put a lower bound on msize (bsc#1051510).
- 9p: use inode->i_lock to protect i_size_write() under 32-bit (bsc#1051510).
- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).
- acpi/device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).
- acpi/nfit: Block function zero DSMs (bsc#1051510).
- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).
- acpi/nfit: Fix bus command validation (bsc#1051510).
- acpi/nfit: Fix command-supported detection (bsc#1051510).
- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).
- acpi/nfit: Fix user-initiated ARS to be 'ARS-long' rather than 'ARS-short' (bsc#1124969).
- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).
- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).
- acpi / video: Extend chassis-type detection with a 'Lunch Box' check (bsc#1051510).
- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).
- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705
- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).
- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).
- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).
- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).
- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).
- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).
- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).
- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).
- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).
- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).
- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).
- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).
- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).
- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).
- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).
- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).
- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).
- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).
- alsa: hda - Serialize codec registrations (bsc#1122944).
- alsa: hda - Use standard device registration for beep (bsc#1122944).
- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).
- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).
- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).
- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).
- altera-stapl: check for a null key before strcasecmp'ing it (bsc#1051510).
- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).
- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).
- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).
- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).
- arm64: fault: avoid send SIGBUS two times (bsc#1126393).
- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).
- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).
- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).
- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).
- arm/arm64: kvm: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).
- arm/arm64: kvm: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).
- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).
- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).
- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).
- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).
- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).
- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).
- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).
- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).
- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).
- arm: pxa: avoid section mismatch warning (bsc#1051510).
- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).
- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).
- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).
- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).
- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).
- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).
- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).
- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).
- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).
- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).
- assoc_array: Fix shortcut creation (bsc#1051510).
- ata: ahci: mvebu: remove stale comment (bsc#1051510).
- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).
- ath9k: dynack: check da->enabled first in sampling routines (bsc#1051510).
- ath9k: dynack: make ewma estimation faster (bsc#1051510).
- ath9k: dynack: use authentication messages for 'late' ack (bsc#1051510).
- atm: he: fix sign-extension overflow on large shift (bsc#1051510).
- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).
- ax25: fix possible use-after-free (bsc#1051510).
- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)
- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).
- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).
- batman-adv: Force mac header to start of data on xmit (bsc#1051510).
- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).
- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).
- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).
- blk-mq: fix a hung issue when fsync (bsc#1125252).
- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).
- block: break discard submissions into the user defined size (git-fixes).
- block: cleanup __blkdev_issue_discard() (git-fixes).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).
- blockdev: Fix livelocks on loop device (bsc#1124984).
- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).
- block: do not use bio->bi_vcnt to figure out segment number (bsc#1128895).
- block: do not warn when doing fsync on read-only devices (bsc#1125252).
- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).
- block: fix infinite loop if the device loses discard capability (git-fixes).
- block/loop: Use global lock for ioctl() operation (bsc#1124974).
- block: make sure discard bio is aligned with logical block size (git-fixes).
- block: make sure writesame bio is aligned with logical block size (git-fixes).
- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).
- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).
- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).
- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).
- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).
- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).
- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).
- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).
- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282 ).
- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).
- bonding: update nest level on unlink (git-fixes).
- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).
- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).
- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1083647).
- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).
- bpf: Fix syscall's stackmap lookup potential deadlock (bsc#1083647).
- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).
- bpf/verifier: fix verifier instability (bsc#1056787).
- bsg: allocate sense buffer if requested (bsc#1106811).
- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).
- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).
- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).
- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).
- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).
- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).
- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).
- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).
- btrfs: fix fsync after succession of renames of different files (bsc#1126481).
- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).
- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).
- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).
- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).
- btrfs: Improve btrfs_search_slot description (bsc#1126802).
- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).
- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).
- btrfs: qgroup: Do not trace subtree if we're dropping reloc tree (bsc#1063638).
- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).
- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).
- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).
- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).
- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).
- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).
- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).
- btrfs: qgroup: Only trace data extents in leaves if we're relocating data block group (bsc#1063638).
- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).
- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).
- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).
- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).
- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).
- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).
- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).
- btrfs: remove always true check in unlock_up (bsc#1126802).
- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).
- btrfs: remove unnecessary level check in balance_level (bsc#1126802).
- btrfs: remove unused check of skip_locking (bsc#1126802).
- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).
- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).
- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).
- btrfs: split btrfs_extent_same (bsc#1127493).
- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).
- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).
- can: bcm: check timer values before ktime conversion (bsc#1051510).
- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).
- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).
- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).
- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).
- ceph: avoid repeatedly adding inode to mdsc->snap_flush_list (bsc#1126790).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).
- cfg80211: extend range deviation for DMG (bsc#1051510).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).
- checkstack.pl: fix for aarch64 (bsc#1051510).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- cifs: add missing debug entries for kconfig options (bsc#1051510).
- cifs: add missing support for ACLs in smb 3.11 (bsc#1051510).
- cifs: add sha512 secmech (bsc#1051510).
- cifs: Add support for reading attributes on smb2+ (bsc#1051510).
- cifs: Add support for writing attributes on smb2+ (bsc#1051510).
- cifs: Always resolve hostname before reconnecting (bsc#1051510).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).
- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).
- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).
- cifs: Fix error mapping for smb2_LOCK command which caused OFD lock problem (bsc#1051510).
- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).
- cifs: Fix NULL pointer dereference of devname (bnc#1129519).
- cifs: fix return value for cifs_listxattr (bsc#1051510).
- cifs: Fix separator when building path from dentry (bsc#1051510).
- cifs: fix set info (bsc#1051510).
- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).
- cifs: fix wrapping bugs in num_entries() (bsc#1051510).
- cifs: For smb2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: hide unused functions (bsc#1051510).
- cifs: implement v3.11 preauth integrity (bsc#1051510).
- cifs: invalidate cache when we truncate a file (bsc#1051510).
- cifs: make 'nodfs' mount opt a superblock flag (bsc#1051510).
- cifs: OFD locks do not conflict with eachothers (bsc#1051510).
- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).
- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).
- cifs: refactor crypto shash/sdesc allocation&free (bsc#1051510).
- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).
- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).
- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).
- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).
- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).
- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).
- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).
- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).
- clk: imx6q: reset exclusive gates on init (bsc#1051510).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).
- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).
- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).
- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).
- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).
- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).
- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).
- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).
- clk: socfpga: fix refcount leak (bsc#1051510).
- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).
- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).
- clk: sunxi-ng: enable so-said LDOs for A64 SoC's pll-mipi clock (bsc#1051510).
- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).
- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).
- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).
- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).
- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).
- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).
- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).
- configfs: fix registered group removal (bsc#1051510).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).
- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).
- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).
- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).
- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).
- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).
- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).
- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).
- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).
- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).
- crypto: ahash - fix another early termination in hash walk (bsc#1051510).
- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).
- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).
- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).
- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).
- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).
- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).
- crypto: caam - fixed handling of sg list (bsc#1051510).
- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).
- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).
- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).
- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).
- crypto: hash - set CRYPTO_TFM_NEED_KEY if ->setkey() fails (bsc#1051510).
- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).
- crypto: tgr192 - fix unaligned memory access (bsc#1051510).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).
- cw1200: drop useless LIST_HEAD (bsc#1051510).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).
- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).
- debugfs: fix debugfs_rename parameter checking (bsc#1051510).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).
- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).
- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).
- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).
- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).
- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).
- dmaengine: at_hdmac: fix module unloading (bsc#1051510).
- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).
- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).
- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).
- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).
- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).
- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).
- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).
- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).
- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).
- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).
- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).
- dma: Introduce dma_max_mapping_size() (bsc#1120008).
- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).
- dm: call blk_queue_split() to impose device limits on bios (git-fixes).
- dm: do not allow readahead to limit IO size (git-fixes).
- dm thin: send event about thin-pool state change _after_ making it (git-fixes).
- dm zoned: Fix target BIO completion handling (git-fixes).
- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).
- doc/README.SUSE: Correct description for building a kernel (bsc#1123348)
- Do not log confusing message on reconnect by default (bsc#1129664).
- Do not log expected error on DFS referral request (bsc#1051510).
- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).
- driver core: Move async_synchronize_full call (bsc#1051510).
- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).
- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).
- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).
- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).
- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).
- drivers/sbus/char: add of_node_put() (bsc#1051510).
- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).
- drm/ast: Fix connector leak during driver unload (bsc#1051510).
- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).
- drm/atomic-helper: Complete fake_commit->flip_done potentially earlier (bsc#1051510).
- drm: Block fb changes for async plane updates (bsc#1051510).
- drm/bridge: tc358767: add defines for DP1_SRCCTRL & PHY_2LANE (bsc#1051510).
- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).
- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).
- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).
- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).
- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).
- drm: Clear state->acquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).
- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).
- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)
- drm/etnaviv: potential NULL dereference (bsc#1113722)
- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)
- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)
- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)
- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)
- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)
- drm/i915/gvt: Fix mmap range check (bsc#1120902)
- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)
- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).
- drm/i915/opregion: fix version check (bsc#1113722)
- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)
- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).
- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)
- drm/meson: add missing of_node_put (bsc#1051510).
- drm/modes: Prevent division by zero htotal (bsc#1051510).
- drm/msm: Fix error return checking (bsc#1051510).
- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).
- drm/msm: Unblock writer if reader closes file (bsc#1051510).
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)
- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).
- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)
- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)
- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)
- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).
- drm/rockchip: fix for mailbox read size (bsc#1051510).
- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)
- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).
- drm/vmwgfx: Do not double-free the mode stored in par->set_mode (bsc#1103429)
- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)
- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)
- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).
- earlycon: Initialize port->uartclk based on clock-frequency property (bsc#1051510).
- earlycon: Remove hardcoded port->uartclk initialization in of_setup_earlycon (bsc#1051510).
- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)
- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).
- enic: fix checksum validation for IPv6 (bsc#1051510).
- esp6: fix memleak on error path in esp6_input (bsc#1051510).
- esp: Fix locking on page fragment allocation (bsc#1051510).
- esp: Fix memleaks on error paths (bsc#1051510).
- esp: Fix skb tailroom calculation (bsc#1051510).
- exportfs: do not read dentry after free (bsc#1051510).
- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).
- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).
- ext4: Fix crash during online resizing (bsc#1122779).
- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).
- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).
- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).
- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).
- fanotify: fix handling of events on child sub-directory (bsc#1122019).
- fat: validate ->i_start before using (bsc#1051510).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1113722)
- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).
- Fix kabi issues with new transport sharing code (bsc#1114893).
- Fix problem with sharetransport= and NFSv4 (bsc#1114893).
- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).
- floppy: check_events callback should not return a negative number (bsc#1051510).
- fork: do not copy inconsistent signal handler state to child (bsc#1051510).
- fork: record start_time late (git-fixes).
- fork: unconditionally clear stack on fork (git-fixes).
- fs/cifs: require sha512 (bsc#1051510).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).
- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).
- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).
- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).
- fuse: handle zero sized retrieve correctly (bsc#1051510).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bsc#1051510).
- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).
- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).
- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).
- geneve, vxlan: Do not set exceptions if skb->len < mtu (bsc#1123456).
- genwqe: Fix size check (bsc#1051510).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bsc#1120601).
- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).
- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).
- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).
- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).
- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).
- gpio: pl061: handle failed allocations (bsc#1051510).
- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).
- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)
- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).
- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).
- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).
- hfs: do not free node before using (bsc#1051510).
- hfsplus: do not free node before using (bsc#1051510).
- hfsplus: prevent btree data loss on root split (bsc#1051510).
- hfs: prevent btree data loss on root split (bsc#1051510).
- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).
- hpet: Fix missing '=' character in the __setup() code of hpet_mmap_enable (git-fixes).
- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).
- hv: v4.12 API for hyperv-iommu (bsc#1122822).
- hwmon/k10temp: Add support for AMD family 17h, model 30h CPUs ().
- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).
- hwmon: (lm80) fix a missing check of the status of smbus read (bsc#1051510).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).
- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).
- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).
- i2c-axxia: check for error conditions first (bsc#1051510).
- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).
- i2c: cadence: Fix the hold bit setting (bsc#1051510).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).
- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).
- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).
- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).
- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).
- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).
- IB/core: Destroy QP if XRC QP fails (bsc#1046306).
- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).
- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).
- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).
- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- ide: pmac: add of_node_put() (bsc#1051510).
- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).
- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).
- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).
- iio: accel: kxcjk1013: Add KIOX010A acpi Hardware-ID (bsc#1051510).
- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).
- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).
- input: bma150 - register input device after setting private data (bsc#1051510).
- input: elan_i2c - add acpi ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).
- input: elan_i2c - add acpi ID for touchpad in Lenovo V330-15ISK (bsc#1051510).
- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).
- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).
- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).
- input: raspberrypi-ts - fix link error (git-fixes).
- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).
- input: restore EV_ABS ABS_RESERVED (bsc#1051510).
- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).
- input: synaptics - enable smbus for HP EliteBook 840 G4 (bsc#1051510).
- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).
- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).
- intel_th: Do not reference unassigned outputs (bsc#1051510).
- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).
- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).
- iomap: warn on zero-length mappings (bsc#1127062).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).
- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).
- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).
- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).
- ipmi:pci: Blacklist a Realtek 'IPMI' device (git-fixes).
- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).
- ipsec: check return value of skb_to_sgvec always (bsc#1051510).
- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).
- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).
- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).
- ipv6: addrlabel: per netns list (bsc#1122982).
- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).
- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).
- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).
- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982). Refresh patches.suse/ip6_vti-fix-a-null-pointer-deference-when-destroy-vt.patch
- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).
- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).
- ip: validate header length on virtual device xmit (networking-stable-19_01_04).
- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).
- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).
- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).
- iscsi target: fix session creation failure handling (bsc#1051510).
- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).
- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).
- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).
- iser: set sector for ambiguous mr status errors (bsc#1051510).
- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).
- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).
- iwlwifi: mvm: fix RSS config command (bsc#1051510).
- iwlwifi: pcie: fix emergency path (bsc#1051510).
- iwlwifi: pcie: fix TX while flushing (bsc#1120902).
- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).
- ixgbe: check return value of napi_complete_done() (bsc#1051510).
- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).
- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).
- kabi: fix xhci kABI stability (bsc#1119086).
- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).
- kabi: handle addition of uevent_sock into struct net (bsc#1122982).
- kabi: Preserve kABI for dma_max_mapping_size() (bsc#1120008).
- kabi: protect struct sctp_association (kabi).
- kabi: protect struct smc_buf_desc (bnc#1117947, LTC#173662).
- kabi: protect struct smc_link (bnc#1117947, LTC#173662).
- kabi: protect vhost_log_write (kabi).
- kabi: restore ip_tunnel_delete_net() (bsc#1122982).
- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).
- kABI workaround for bt_accept_enqueue() change (bsc#1051510).
- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).
- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).
- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).
- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).
- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).
- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).
- keys: allow reaching the keys quotas exactly (bsc#1051510).
- keys: Timestamp new keys (bsc#1051510).
- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).
- kgdboc: Fix restrict error (bsc#1051510).
- kgdboc: Fix warning with module build (bsc#1051510).
- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).
- kobject: copy env blob in one go (bsc#1122982).
- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).
- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).
- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).
- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).
- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).
- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).
- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).
- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- kvm: x86: fix L1TF's MMIO GFN calculation (bsc#1124204).
- kvm: x86: Fix single-step debugging (bsc#1129295).
- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).
- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).
- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).
- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).
- lan78xx: Resolve issue with changing MAC address (bsc#1051510).
- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).
- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).
- libceph: handle an empty authorize reply (bsc#1126789).
- lib/div64.c: off by one in shift (bsc#1051510).
- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).
- libnvdimm/label: Clear 'updating' flag after label-set update (bsc#1129543).
- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).
- lib/rbtree-test: lower default params (git-fixes).
- lightnvm: fail fast on passthrough commands (bsc#1125780).
- livepatch: Change unsigned long old_addr -> void *old_func in struct klp_func (bsc#1071995).
- livepatch: Consolidate klp_free functions (bsc#1071995 ).
- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).
- livepatch: Define a macro for new API identification (bsc#1071995).
- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).
- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).
- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).
- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).
- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).
- livepatch: Remove signal sysfs attribute (bsc#1071995 ).
- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).
- livepatch: Send a fake signal periodically (bsc#1071995 ).
- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).
- livepatch: Simplify API by removing registration step (bsc#1071995).
- llc: do not use sk_eat_skb() (bsc#1051510).
- lockd: fix access beyond unterminated strings in prints (git-fixes).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: drop caches if offset or block_size are changed (bsc#1124975).
- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).
- LSM: Check for NULL cred-security on free (bsc#1051510).
- mac80211: Add attribute aligned(2) to struct 'action' (bsc#1051510).
- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).
- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).
- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).
- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).
- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).
- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).
- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).
- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).
- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).
- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).
- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).
- media: s5k4ecgx: delete a bogus error message (bsc#1051510).
- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).
- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).
- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).
- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).
- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).
- media: uvcvideo: Fix 'type' check leading to overflow (bsc#1051510).
- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).
- media: v4l2-tpg: array index could become negative (bsc#1051510).
- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).
- media: vb2: be sure to unlock mutex on errors (bsc#1051510).
- media: vb2: vb2_mmap: move lock up (bsc#1051510).
- media: vivid: fix error handling of kthread_run (bsc#1051510).
- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).
- media: vivid: set min width/height to a value > 0 (bsc#1051510).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).
- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).
- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).
- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).
- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).
- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).
- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).
- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).
- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).
- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).
- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).
- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).
- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).
- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).
- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).
- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).
- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).
- misc: sram: enable clock before registering regions (bsc#1051510).
- misc: sram: fix resource leaks in probe error path (bsc#1051510).
- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).
- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).
- mISDN: fix a race in dev_expire_timer() (bsc#1051510).
- mlx4: trigger IB events needed by SMC (bnc#1117947, LTC#173662).
- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).
- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).
- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).
- mmap: relax file size limit for regular files (git fixes (mm/mmap)).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).
- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).
- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).
- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).
- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).
- mmc: omap: fix the maximum timeout setting (bsc#1051510).
- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).
- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).
- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).
- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).
- mmc: spi: Fix card detection during probe (bsc#1051510).
- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).
- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).
- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).
- mm/ksm.c: ignore STABLE_FLAG of rmap_item->address in rmap_walk_ksm() (git fixes (mm/ksm)).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).
- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).
- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)
- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).
- mm: migration: factor out code to compute expected number of page references (bsc#1084216).
- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).
- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).
- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).
- Moved patches.fixes/x86-add-tsx-force-abort-cpuid-msr.patch to patches.arch/ and added upstream tags (bsc#1129363) patches.arch/x86-add-tsx-force-abort-cpuid-msr
- Move the upstreamed HD-audio fix into sorted section
- mpt3sas: check sense buffer before copying sense data (bsc#1106811).
- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).
- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).
- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).
- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).
- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).
- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).
- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).
- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).
- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).
- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).
- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).
- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).
- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).
- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).
- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).
- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).
- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).
- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).
- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).
- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).
- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).
- mtd: nand: ifc: update bufnum mask for ver >= 2.0.0 (bsc#1051510).
- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).
- mtd: nand: omap2: Fix subpage write (bsc#1051510).
- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).
- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).
- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).
- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).
- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).
- mtd: nand: vf610: set correct ooblayout (bsc#1051510).
- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).
- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).
- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).
- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).
- mv88e6060: disable hardware level MAC learning (bsc#1051510).
- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).
- neighbour: Avoid writing before skb->head in neigh_hh_output() (networking-stable-18_12_12).
- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).
- net: add uevent socket member (bsc#1122982).
- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).
- net: aquantia: fixed instack structure overflow (git-fixes).
- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).
- net: bcmgenet: abort suspend on error (bsc#1051510).
- net: bcmgenet: code movement (bsc#1051510).
- net: bcmgenet: fix OF child-node lookup (bsc#1051510).
- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).
- net: bcmgenet: return correct value 'ret' from bcmgenet_power_down (bsc#1051510).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).
- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).
- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- net: do not call update_pmtu unconditionally (bsc#1123456).
- net: Do not default Cavium PTP driver to 'y' (bsc#1110096).
- net: dp83640: expire old TX-skb (networking-stable-19_02_10).
- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).
- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).
- net: ena: fix race between link up and device initalization (bsc#1083548).
- netfilter: nf_tables: check the result of dereferencing base_chain->stats (git-fixes).
- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).
- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).
- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).
- net: hns3: add handling for big TX fragment (bsc#1104353 ).
- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).
- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).
- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).
- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).
- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).
- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).
- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).
- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).
- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).
- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).
- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).
- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).
- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).
- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).
- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).
- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).
- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Release resource on error flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).
- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).
- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).
- netns: restrict uevents (bsc#1122982).
- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).
- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).
- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).
- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).
- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).
- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).
- netrom: switch to sock timer API (bsc#1051510).
- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).
- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).
- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).
- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).
- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).
- net/smc: abort CLC connection in smc_release (bnc#1117947, LTC#173662).
- net/smc: add infrastructure to send delete rkey messages (bnc#1117947, LTC#173662).
- net/smc: add SMC-D shutdown signal (bnc#1117947, LTC#173662).
- net/smc: allow fallback after clc timeouts (bnc#1117947, LTC#173662).
- net/smc: atomic SMCD cursor handling (bnc#1117947, LTC#173662).
- net/smc: avoid a delay by waiting for nothing (bnc#1117947, LTC#173662).
- net/smc: cleanup listen worker mutex unlocking (bnc#1117947, LTC#173662).
- net/smc: cleanup tcp_listen_worker initialization (bnc#1117947, LTC#173662).
- net/smc: enable fallback for connection abort in state INIT (bnc#1117947, LTC#173662).
- net/smc: fix non-blocking connect problem (bnc#1117947, LTC#173662).
- net/smc: fix sizeof to int comparison (bnc#1117947, LTC#173662).
- net/smc: fix smc_buf_unuse to use the lgr pointer (bnc#1117947, LTC#173662).
- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).
- net/smc: make smc_lgr_free() static (bnc#1117947, LTC#173662).
- net/smc: no link delete for a never active link (bnc#1117947, LTC#173662).
- net/smc: no urgent data check for listen sockets (bnc#1117947, LTC#173662).
- net/smc: remove duplicate mutex_unlock (bnc#1117947, LTC#173662).
- net/smc: remove sock_error detour in clc-functions (bnc#1117947, LTC#173662).
- net/smc: short wait for late smc_clc_wait_msg (bnc#1117947, LTC#173662).
- net/smc: unregister rkeys of unused buffer (bnc#1117947, LTC#173662).
- net/smc: use after free fix in smc_wr_tx_put_slot() (bnc#1117947, LTC#173662).
- net/smc: use queue pair number when matching link group (bnc#1117947, LTC#173662).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).
- net: stmmac: Fix PCI module removal leak (git-fixes).
- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).
- net: stmmac: Use mutex instead of spinlock (git-fixes).
- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).
- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).
- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).
- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).
- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).
- nfit: acpi_nfit_ctl(): Check out_obj->type in the right place (bsc#1129547).
- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).
- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).
- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).
- nfs: Allow NFSv4 mounts to not share transports ().
- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).
- nfsd: Fix an Oops in free_session() (git-fixes).
- nfs: Fix a missed page unlock after pg_doio() (git-fixes).
- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).
- nfs: support 'nosharetransport' option (bnc#807502, bnc#828192, ).
- nfsv4.1: Fix the r/wsize checking (git-fixes).
- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).
- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).
- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).
- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).
- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).
- nvme: kABI fix for scan_lock (bsc#1123882).
- nvme: lock NS list changes while handling command effects (bsc#1123882).
- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).
- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).
- nvme-multipath: round-robin I/O policy (bsc#1110705).
- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).
- of, numa: Validate some distance map rules (bsc#1051510).
- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).
- omap2fb: Fix stack memory disclosure (bsc#1120902)
- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).
- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).
- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).
- packet: Do not leak dev refcounts on error exit (git-fixes).
- packet: validate address length if non-zero (networking-stable-19_01_04).
- packet: validate address length (networking-stable-19_01_04).
- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).
- Partially revert 'block: fail op_is_write() requests to (bsc#1125252).
- PCI: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).
- PCI: Disable broken RTIT_BAR of Intel TH (bsc#1120318).
- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).
- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).
- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).
- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).
- pcrypt: use format specifier in kobject_add (bsc#1051510).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).
- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).
- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).
- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).
- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).
- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).
- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).
- phy: tegra: remove redundant self assignment of 'map' (bsc#1051510).
- phy: work around 'phys' references to usb-nop-xceiv devices (bsc#1051510).
- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).
- pinctrl: meson: fix pull enable register calculation (bsc#1051510).
- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).
- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).
- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).
- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).
- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).
- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).
- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).
- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).
- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).
- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).
- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).
- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).
- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).
- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).
- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).
- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).
- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).
- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).
- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).
- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).
- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).
- powerpc: Add an option to disable static PCI bus numbering (bsc#1122159).
- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).
- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).
- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).
- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).
- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).
- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).
- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).
- powerpc/tm: Fix comment (bsc#1118338).
- powerpc/tm: Fix endianness flip on trap (bsc#1118338).
- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).
- powerpc/tm: Fix HTM documentation (bsc#1118338).
- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).
- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).
- powerpc/tm: Print 64-bits MSR (bsc#1118338).
- powerpc/tm: Print scratch value (bsc#1118338).
- powerpc/tm: Reformat comments (bsc#1118338).
- powerpc/tm: Remove msr_tm_active() (bsc#1118338).
- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).
- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).
- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).
- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).
- powerpc/tm: Update function prototype comment (bsc#1118338).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).
- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).
- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).
- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).
- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).
- ptp_kvm: probe for kvm guest availability (bsc#1098382).
- ptr_ring: wrap back ->producer in __ptr_ring_swap_queue() (networking-stable-19_01_04).
- Put the xhci fix patch to the right place in the sorted section
- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).
- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).
- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).
- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).
- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).
- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).
- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).
- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).
- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).
- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).
- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).
- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).
- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).
- rdma/core: Fix unwinding flow in case of error to register device (bsc#1046306).
- rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).
- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)
- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).
- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).
- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).
- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).
- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).
- Remove blacklist of virtio patch so we can install it (bsc#1114585)
- Revert 'drm/rockchip: Allow driver to be shutdown on reboot/kexec' (bsc#1051510).
- Revert 'input: elan_i2c - add acpi ID for touchpad in ASUS Aspire F5-573G' (bsc#1051510).
- Revert 'openvswitch: Fix template leak in error cases.' (bsc#1051510).
- Revert 'scsi: qla2xxx: Fix NVMe Target discovery' (bsc#1125252).
- Revert 'serial: 8250: Fix clearing FIFOs in RS485 mode again' (bsc#1051510).
- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.
- Revert 'xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue' (bsc#1120854).
- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).
- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697) dracut has been using permissions 0600 for the initrd for a long time.
- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)
- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).
- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).
- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).
- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).
- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).
- s390/early: improve machine detection (git-fixes).
- s390/ism: clear dmbe_mask bit before SMC IRQ handling (bnc#1117947, LTC#173662).
- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).
- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).
- s390/qeth: fix use-after-free in error path (bsc#1127534).
- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).
- s390/sthyi: Fix machine name validity indication (git-fixes).
- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).
- sata_rcar: fix deferred probing (bsc#1051510).
- sbus: char: add of_node_put() (bsc#1051510).
- sc16is7xx: Fix for multi-channel stall (bsc#1051510).
- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).
- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- sch_multiq: fix double free on init failure (bsc#1051510).
- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).
- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).
- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).
- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).
- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).
- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).
- scsi: lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).
- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).
- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).
- scsi: lpfc: fix remoteport access (bsc#1125252).
- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).
- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).
- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).
- scsi: mpt3sas: Add ioc_<level> logging macros (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_<level> with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_<level> with MPT3SAS_FMT to ioc_<level> (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).
- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).
- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).
- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).
- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).
- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).
- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).
- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).
- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).
- scsi: qla2xxx: Simplify conditional check (bsc#1094555).
- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).
- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).
- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).
- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).
- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).
- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).
- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).
- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).
- sctp: kfree_rcu asoc (networking-stable-18_12_12).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).
- selftests/livepatch: introduce tests (bsc#1071995).
- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).
- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).
- selinux: always allow mounting submounts (bsc#1051510).
- selinux: fix GPF on invalid policy (bsc#1051510).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).
- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).
- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).
- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).
- serial: imx: fix error handling in console_setup (bsc#1051510).
- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).
- serial/sunsu: fix refcount leak (bsc#1051510).
- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).
- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).
- signal: Always deliver the kernel's SIGKILL and SIGSTOP to a pid namespace init (git-fixes).
- skge: potential memory corruption in skge_get_regs() (bsc#1051510).
- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).
- sky2: Increase D3 delay again (bsc#1051510).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).
- smb3.1.1 dialect is no longer experimental (bsc#1051510).
- smb311: Fix reconnect (bsc#1051510).
- smb311: Improve checking of negotiate security contexts (bsc#1051510).
- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).
- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).
- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).
- smb3: check for and properly advertise directory lease support (bsc#1051510).
- smb3: directory sync should not return an error (bsc#1051510).
- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).
- smb3: do not request leases in symlink creation and query (bsc#1051510).
- smb3: Do not send smb3 SET_INFO if nothing changed (bsc#1051510).
- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).
- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).
- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).
- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).
- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).
- smb3: fix various xid leaks (bsc#1051510).
- smb3: Improve security, move default dialect to smb3 from old CIFS (bsc#1051510).
- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).
- smb3: Remove ifdef since smb3 (and later) now STRONGLY preferred (bsc#1051510).
- smb3: remove noisy warning message on mount (bsc#1129664).
- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).
- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).
- soc/tegra: Do not leak device tree node reference (bsc#1051510).
- splice: do not merge into linked buffers (git-fixes).
- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).
- staging: iio: ad7780: update voltage on read (bsc#1051510).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).
- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).
- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).
- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).
- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).
- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).
- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).
- staging: speakup: Replace strncpy with memcpy (bsc#1051510).
- staging: wilc1000: fix to set correct value for 'vif_num' (bsc#1051510).
- sunrpc: correct the computation for page_ptr when truncating (git-fixes).
- sunrpc: Fix a potential race in xprt_connect() (git-fixes).
- sunrpc: Fix leak of krb5p encode pages (git-fixes).
- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).
- sunrpc: safely reallow resvport min/max inversion (git-fixes).
- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).
- swiotlb: Add is_swiotlb_active() function (bsc#1120008).
- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).
- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).
- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).
- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).
- tcp: batch tcp_net_metrics_exit (bsc#1122982).
- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).
- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).
- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).
- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).
- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).
- tcp: lack of available data can also cause TSO defer (git-fixes).
- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).
- team: Free BPF filter when unregistering netdev (bsc#1051510).
- thermal: do not clear passive state during system sleep (bsc#1051510).
- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).
- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).
- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).
- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).
- thermal: mediatek: fix register index error (bsc#1051510).
- timekeeping: Use proper seqcount initializer (bsc#1051510).
- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).
- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).
- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).
- tipc: fix a double kfree_skb() (networking-stable-19_01_04).
- tipc: fix a race condition of releasing subscriber object (bsc#1051510).
- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).
- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).
- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).
- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).
- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).
- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).
- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).
- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).
- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).
- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).
- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).
- tracing: Do not free iter->trace in fail path of tracing_open_pipe() (bsc#1129581).
- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).
- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).
- Tree connect for smb3.1.1 must be signed for non-encrypted shares (bsc#1051510).
- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).
- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).
- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).
- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).
- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).
- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).
- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).
- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).
- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).
- uevent: add alloc_uevent_skb() helper (bsc#1122982).
- Update config files. Remove conditional support for smb2 and SMB3:
- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).
- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).
- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.
- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).
- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).
- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).
- usb: Add new USB LPM helpers (bsc#1120902).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).
- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).
- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).
- usb: dwc3: gadget: Clear req->needs_extra_trb flag on cleanup (bsc#1120902).
- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).
- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).
- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).
- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).
- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).
- usb: musb: dsps: fix otg state machine (bsc#1051510).
- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).
- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).
- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).
- usb: phy: am335x: fix race condition in _probe (bsc#1051510).
- usb: serial: option: add Fibocom NL678 series (bsc#1120902).
- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).
- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).
- usb: storage: add quirk for SMI SM3350 (bsc#1120902).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).
- usb: xhci: fix 'broken_suspend' placement in struct xchi_hcd (bsc#1119086).
- veth: set peer GSO values (bsc#1051510).
- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).
- vfio: ccw: process ssch with interrupts disabled (git-fixes).
- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).
- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).
- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).
- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).
- vhost: log dirty page correctly (networking-stable-19_01_26).
- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).
- vhost/vsock: fix uninitialized vhost_vsock->guest_cid (bsc#1051510).
- video: clps711x-fb: release disp device node in probe() (bsc#1051510).
- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).
- virtio: Introduce virtio_max_dma_size() (bsc#1120008).
- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).
- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).
- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).
- virtio/s390: avoid race on vcdev->config (git-fixes).
- virtio/s390: fix race in ccw_io_helper() (git-fixes).
- vmci: Support upto 64-bit PPNs (bsc#1127286).
- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).
- vsock: Send reset control packet when socket is partially bound (networking-stable-19_01_04).
- vt: invoke notifier on screen size change (bsc#1051510).
- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).
- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).
- vxlan: test dev->flags & IFF_UP before calling gro_cells_receive() (git-fixes).
- vxlan: update skb dst pmtu on tx path (bsc#1123456).
- w90p910_ether: remove incorrect __init annotation (bsc#1051510).
- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).
- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).
- writeback: do not decrement wb->refcnt if !wb->bdi (git fixes (writeback)).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86/amd_nb: Add PCI device IDs for family 17h, model 30h ().
- x86/amd_nb: Add support for newer PCI topologies ().
- x86/a.out: Clear the dump structure initially (bsc#1114279).
- x86/apic: Provide apic_ack_irq() (bsc#1122822).
- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).
- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).
- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).
- x86/bugs: Add AMD's variant of SSB_NO (bsc#1114279).
- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).
- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).
- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).
- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).
- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).
- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).
- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).
- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).
- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).
- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).
- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).
- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).
- x86/vdso: Remove obsolete 'fake section table' reservation (bsc#1114279).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).
- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).
- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: fix dom0 boot on huge systems (bsc#1127836).
- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).
- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).
- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).
- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).
- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).
- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).
- Yama: Check for pid death before checking ancestry (bsc#1051510).
- yam: fix a missing-check bug (bsc#1051510).
- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).
- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).
Patchnames
SUSE-2019-765,SUSE-SLE-DESKTOP-12-SP4-2019-765,SUSE-SLE-HA-12-SP4-2019-765,SUSE-SLE-Live-Patching-12-SP4-2019-765,SUSE-SLE-SDK-12-SP4-2019-765,SUSE-SLE-SERVER-12-SP4-2019-765,SUSE-SLE-WE-12-SP4-2019-765
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks. (bnc#1122971).\n- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) can cause a system lock up and a denial of service. (bnc#1123161).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728 ).\n- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).\n- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host\u0027s stack memory contents to a guest (bsc#1124735).\n- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).\n- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).\n- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).\n- 9p: clear dangling pointers in p9stat_free (bsc#1051510).\n- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).\n- 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n- 9p/net: put a lower bound on msize (bsc#1051510).\n- 9p: use inode-\u003ei_lock to protect i_size_write() under 32-bit (bsc#1051510).\n- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).\n- acpi/device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).\n- acpi/nfit: Block function zero DSMs (bsc#1051510).\n- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).\n- acpi/nfit: Fix bus command validation (bsc#1051510).\n- acpi/nfit: Fix command-supported detection (bsc#1051510).\n- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).\n- acpi/nfit: Fix user-initiated ARS to be \u0027ARS-long\u0027 rather than \u0027ARS-short\u0027 (bsc#1124969).\n- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).\n- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).\n- acpi / video: Extend chassis-type detection with a \u0027Lunch Box\u0027 check (bsc#1051510).\n- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705\n- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).\n- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).\n- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).\n- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).\n- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).\n- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).\n- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).\n- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).\n- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).\n- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).\n- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).\n- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).\n- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).\n- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).\n- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).\n- alsa: hda - Serialize codec registrations (bsc#1122944).\n- alsa: hda - Use standard device registration for beep (bsc#1122944).\n- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).\n- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).\n- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).\n- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).\n- altera-stapl: check for a null key before strcasecmp\u0027ing it (bsc#1051510).\n- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).\n- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).\n- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).\n- arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).\n- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).\n- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).\n- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).\n- arm/arm64: kvm: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n- arm/arm64: kvm: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).\n- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).\n- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).\n- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).\n- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).\n- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).\n- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).\n- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).\n- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).\n- arm: pxa: avoid section mismatch warning (bsc#1051510).\n- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).\n- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).\n- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).\n- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).\n- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).\n- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).\n- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).\n- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).\n- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).\n- assoc_array: Fix shortcut creation (bsc#1051510).\n- ata: ahci: mvebu: remove stale comment (bsc#1051510).\n- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).\n- ath9k: dynack: check da-\u003eenabled first in sampling routines (bsc#1051510).\n- ath9k: dynack: make ewma estimation faster (bsc#1051510).\n- ath9k: dynack: use authentication messages for \u0027late\u0027 ack (bsc#1051510).\n- atm: he: fix sign-extension overflow on large shift (bsc#1051510).\n- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).\n- ax25: fix possible use-after-free (bsc#1051510).\n- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)\n- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).\n- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).\n- batman-adv: Force mac header to start of data on xmit (bsc#1051510).\n- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).\n- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).\n- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).\n- blk-mq: fix a hung issue when fsync (bsc#1125252).\n- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).\n- block: break discard submissions into the user defined size (git-fixes).\n- block: cleanup __blkdev_issue_discard() (git-fixes).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- blockdev: Fix livelocks on loop device (bsc#1124984).\n- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128895).\n- block: do not warn when doing fsync on read-only devices (bsc#1125252).\n- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).\n- block: fix infinite loop if the device loses discard capability (git-fixes).\n- block/loop: Use global lock for ioctl() operation (bsc#1124974).\n- block: make sure discard bio is aligned with logical block size (git-fixes).\n- block: make sure writesame bio is aligned with logical block size (git-fixes).\n- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).\n- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).\n- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).\n- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).\n- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).\n- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).\n- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).\n- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).\n- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282 ).\n- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).\n- bonding: update nest level on unlink (git-fixes).\n- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).\n- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).\n- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1083647).\n- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).\n- bpf: Fix syscall\u0027s stackmap lookup potential deadlock (bsc#1083647).\n- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).\n- bpf/verifier: fix verifier instability (bsc#1056787).\n- bsg: allocate sense buffer if requested (bsc#1106811).\n- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).\n- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).\n- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).\n- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).\n- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).\n- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).\n- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).\n- btrfs: fix fsync after succession of renames of different files (bsc#1126481).\n- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).\n- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).\n- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).\n- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).\n- btrfs: Improve btrfs_search_slot description (bsc#1126802).\n- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1063638).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).\n- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).\n- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).\n- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1063638).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).\n- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).\n- btrfs: remove always true check in unlock_up (bsc#1126802).\n- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).\n- btrfs: remove unnecessary level check in balance_level (bsc#1126802).\n- btrfs: remove unused check of skip_locking (bsc#1126802).\n- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).\n- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).\n- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n- btrfs: split btrfs_extent_same (bsc#1127493).\n- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).\n- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).\n- can: bcm: check timer values before ktime conversion (bsc#1051510).\n- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).\n- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).\n- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).\n- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126790).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).\n- cfg80211: extend range deviation for DMG (bsc#1051510).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).\n- checkstack.pl: fix for aarch64 (bsc#1051510).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: add missing debug entries for kconfig options (bsc#1051510).\n- cifs: add missing support for ACLs in smb 3.11 (bsc#1051510).\n- cifs: add sha512 secmech (bsc#1051510).\n- cifs: Add support for reading attributes on smb2+ (bsc#1051510).\n- cifs: Add support for writing attributes on smb2+ (bsc#1051510).\n- cifs: Always resolve hostname before reconnecting (bsc#1051510).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).\n- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).\n- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).\n- cifs: Fix error mapping for smb2_LOCK command which caused OFD lock problem (bsc#1051510).\n- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).\n- cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n- cifs: fix return value for cifs_listxattr (bsc#1051510).\n- cifs: Fix separator when building path from dentry (bsc#1051510).\n- cifs: fix set info (bsc#1051510).\n- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).\n- cifs: fix wrapping bugs in num_entries() (bsc#1051510).\n- cifs: For smb2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: implement v3.11 preauth integrity (bsc#1051510).\n- cifs: invalidate cache when we truncate a file (bsc#1051510).\n- cifs: make \u0027nodfs\u0027 mount opt a superblock flag (bsc#1051510).\n- cifs: OFD locks do not conflict with eachothers (bsc#1051510).\n- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).\n- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: refactor crypto shash/sdesc allocation\u0026free (bsc#1051510).\n- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).\n- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).\n- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).\n- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).\n- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).\n- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).\n- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).\n- clk: imx6q: reset exclusive gates on init (bsc#1051510).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).\n- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).\n- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).\n- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).\n- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).\n- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).\n- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).\n- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).\n- clk: socfpga: fix refcount leak (bsc#1051510).\n- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).\n- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).\n- clk: sunxi-ng: enable so-said LDOs for A64 SoC\u0027s pll-mipi clock (bsc#1051510).\n- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).\n- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).\n- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).\n- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).\n- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).\n- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).\n- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).\n- configfs: fix registered group removal (bsc#1051510).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).\n- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).\n- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).\n- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).\n- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).\n- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).\n- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).\n- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).\n- crypto: ahash - fix another early termination in hash walk (bsc#1051510).\n- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).\n- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).\n- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).\n- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).\n- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).\n- crypto: caam - fixed handling of sg list (bsc#1051510).\n- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).\n- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).\n- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).\n- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).\n- crypto: hash - set CRYPTO_TFM_NEED_KEY if -\u003esetkey() fails (bsc#1051510).\n- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).\n- crypto: tgr192 - fix unaligned memory access (bsc#1051510).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).\n- cw1200: drop useless LIST_HEAD (bsc#1051510).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).\n- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).\n- debugfs: fix debugfs_rename parameter checking (bsc#1051510).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).\n- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).\n- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).\n- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).\n- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).\n- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).\n- dmaengine: at_hdmac: fix module unloading (bsc#1051510).\n- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).\n- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).\n- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).\n- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).\n- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).\n- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).\n- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).\n- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).\n- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).\n- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).\n- dma: Introduce dma_max_mapping_size() (bsc#1120008).\n- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).\n- dm: call blk_queue_split() to impose device limits on bios (git-fixes).\n- dm: do not allow readahead to limit IO size (git-fixes).\n- dm thin: send event about thin-pool state change _after_ making it (git-fixes).\n- dm zoned: Fix target BIO completion handling (git-fixes).\n- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).\n- doc/README.SUSE: Correct description for building a kernel (bsc#1123348)\n- Do not log confusing message on reconnect by default (bsc#1129664).\n- Do not log expected error on DFS referral request (bsc#1051510).\n- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).\n- driver core: Move async_synchronize_full call (bsc#1051510).\n- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).\n- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).\n- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).\n- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- drivers/sbus/char: add of_node_put() (bsc#1051510).\n- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).\n- drm/ast: Fix connector leak during driver unload (bsc#1051510).\n- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).\n- drm/atomic-helper: Complete fake_commit-\u003eflip_done potentially earlier (bsc#1051510).\n- drm: Block fb changes for async plane updates (bsc#1051510).\n- drm/bridge: tc358767: add defines for DP1_SRCCTRL \u0026 PHY_2LANE (bsc#1051510).\n- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).\n- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).\n- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).\n- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).\n- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n- drm: Clear state-\u003eacquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).\n- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).\n- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)\n- drm/etnaviv: potential NULL dereference (bsc#1113722)\n- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)\n- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)\n- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)\n- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n- drm/i915/gvt: Fix mmap range check (bsc#1120902)\n- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)\n- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).\n- drm/i915/opregion: fix version check (bsc#1113722)\n- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)\n- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)\n- drm/meson: add missing of_node_put (bsc#1051510).\n- drm/modes: Prevent division by zero htotal (bsc#1051510).\n- drm/msm: Fix error return checking (bsc#1051510).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).\n- drm/msm: Unblock writer if reader closes file (bsc#1051510).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)\n- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).\n- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)\n- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)\n- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).\n- drm/rockchip: fix for mailbox read size (bsc#1051510).\n- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)\n- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)\n- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)\n- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).\n- earlycon: Initialize port-\u003euartclk based on clock-frequency property (bsc#1051510).\n- earlycon: Remove hardcoded port-\u003euartclk initialization in of_setup_earlycon (bsc#1051510).\n- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).\n- enic: fix checksum validation for IPv6 (bsc#1051510).\n- esp6: fix memleak on error path in esp6_input (bsc#1051510).\n- esp: Fix locking on page fragment allocation (bsc#1051510).\n- esp: Fix memleaks on error paths (bsc#1051510).\n- esp: Fix skb tailroom calculation (bsc#1051510).\n- exportfs: do not read dentry after free (bsc#1051510).\n- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).\n- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).\n- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).\n- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).\n- fanotify: fix handling of events on child sub-directory (bsc#1122019).\n- fat: validate -\u003ei_start before using (bsc#1051510).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1113722)\n- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).\n- Fix kabi issues with new transport sharing code (bsc#1114893).\n- Fix problem with sharetransport= and NFSv4 (bsc#1114893).\n- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).\n- floppy: check_events callback should not return a negative number (bsc#1051510).\n- fork: do not copy inconsistent signal handler state to child (bsc#1051510).\n- fork: record start_time late (git-fixes).\n- fork: unconditionally clear stack on fork (git-fixes).\n- fs/cifs: require sha512 (bsc#1051510).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).\n- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).\n- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).\n- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).\n- fuse: handle zero sized retrieve correctly (bsc#1051510).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bsc#1051510).\n- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).\n- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).\n- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).\n- geneve, vxlan: Do not set exceptions if skb-\u003elen \u003c mtu (bsc#1123456).\n- genwqe: Fix size check (bsc#1051510).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bsc#1120601).\n- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).\n- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).\n- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).\n- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).\n- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).\n- gpio: pl061: handle failed allocations (bsc#1051510).\n- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).\n- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)\n- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).\n- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).\n- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).\n- hfs: do not free node before using (bsc#1051510).\n- hfsplus: do not free node before using (bsc#1051510).\n- hfsplus: prevent btree data loss on root split (bsc#1051510).\n- hfs: prevent btree data loss on root split (bsc#1051510).\n- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).\n- hpet: Fix missing \u0027=\u0027 character in the __setup() code of hpet_mmap_enable (git-fixes).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).\n- hv: v4.12 API for hyperv-iommu (bsc#1122822).\n- hwmon/k10temp: Add support for AMD family 17h, model 30h CPUs ().\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).\n- hwmon: (lm80) fix a missing check of the status of smbus read (bsc#1051510).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).\n- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).\n- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).\n- i2c-axxia: check for error conditions first (bsc#1051510).\n- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).\n- i2c: cadence: Fix the hold bit setting (bsc#1051510).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).\n- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).\n- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).\n- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).\n- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).\n- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).\n- IB/core: Destroy QP if XRC QP fails (bsc#1046306).\n- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).\n- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).\n- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).\n- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- ide: pmac: add of_node_put() (bsc#1051510).\n- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).\n- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).\n- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).\n- iio: accel: kxcjk1013: Add KIOX010A acpi Hardware-ID (bsc#1051510).\n- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).\n- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).\n- input: bma150 - register input device after setting private data (bsc#1051510).\n- input: elan_i2c - add acpi ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).\n- input: elan_i2c - add acpi ID for touchpad in Lenovo V330-15ISK (bsc#1051510).\n- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).\n- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).\n- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).\n- input: raspberrypi-ts - fix link error (git-fixes).\n- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).\n- input: restore EV_ABS ABS_RESERVED (bsc#1051510).\n- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).\n- input: synaptics - enable smbus for HP EliteBook 840 G4 (bsc#1051510).\n- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).\n- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).\n- intel_th: Do not reference unassigned outputs (bsc#1051510).\n- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).\n- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).\n- iomap: warn on zero-length mappings (bsc#1127062).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).\n- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).\n- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).\n- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).\n- ipmi:pci: Blacklist a Realtek \u0027IPMI\u0027 device (git-fixes).\n- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).\n- ipsec: check return value of skb_to_sgvec always (bsc#1051510).\n- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).\n- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: addrlabel: per netns list (bsc#1122982).\n- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).\n- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).\n- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982). Refresh patches.suse/ip6_vti-fix-a-null-pointer-deference-when-destroy-vt.patch\n- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).\n- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).\n- ip: validate header length on virtual device xmit (networking-stable-19_01_04).\n- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).\n- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).\n- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).\n- iscsi target: fix session creation failure handling (bsc#1051510).\n- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).\n- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).\n- iser: set sector for ambiguous mr status errors (bsc#1051510).\n- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).\n- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).\n- iwlwifi: mvm: fix RSS config command (bsc#1051510).\n- iwlwifi: pcie: fix emergency path (bsc#1051510).\n- iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).\n- ixgbe: check return value of napi_complete_done() (bsc#1051510).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).\n- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).\n- kabi: fix xhci kABI stability (bsc#1119086).\n- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).\n- kabi: handle addition of uevent_sock into struct net (bsc#1122982).\n- kabi: Preserve kABI for dma_max_mapping_size() (bsc#1120008).\n- kabi: protect struct sctp_association (kabi).\n- kabi: protect struct smc_buf_desc (bnc#1117947, LTC#173662).\n- kabi: protect struct smc_link (bnc#1117947, LTC#173662).\n- kabi: protect vhost_log_write (kabi).\n- kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).\n- kABI workaround for bt_accept_enqueue() change (bsc#1051510).\n- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).\n- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).\n- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).\n- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).\n- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).\n- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).\n- keys: allow reaching the keys quotas exactly (bsc#1051510).\n- keys: Timestamp new keys (bsc#1051510).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).\n- kgdboc: Fix restrict error (bsc#1051510).\n- kgdboc: Fix warning with module build (bsc#1051510).\n- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).\n- kobject: copy env blob in one go (bsc#1122982).\n- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).\n- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).\n- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).\n- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).\n- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: fix L1TF\u0027s MMIO GFN calculation (bsc#1124204).\n- kvm: x86: Fix single-step debugging (bsc#1129295).\n- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).\n- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).\n- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).\n- lan78xx: Resolve issue with changing MAC address (bsc#1051510).\n- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).\n- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).\n- libceph: handle an empty authorize reply (bsc#1126789).\n- lib/div64.c: off by one in shift (bsc#1051510).\n- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).\n- libnvdimm/label: Clear \u0027updating\u0027 flag after label-set update (bsc#1129543).\n- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).\n- lib/rbtree-test: lower default params (git-fixes).\n- lightnvm: fail fast on passthrough commands (bsc#1125780).\n- livepatch: Change unsigned long old_addr -\u003e void *old_func in struct klp_func (bsc#1071995).\n- livepatch: Consolidate klp_free functions (bsc#1071995 ).\n- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).\n- livepatch: Define a macro for new API identification (bsc#1071995).\n- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).\n- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).\n- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).\n- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).\n- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).\n- livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).\n- livepatch: Send a fake signal periodically (bsc#1071995 ).\n- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).\n- livepatch: Simplify API by removing registration step (bsc#1071995).\n- llc: do not use sk_eat_skb() (bsc#1051510).\n- lockd: fix access beyond unterminated strings in prints (git-fixes).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: drop caches if offset or block_size are changed (bsc#1124975).\n- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).\n- LSM: Check for NULL cred-security on free (bsc#1051510).\n- mac80211: Add attribute aligned(2) to struct \u0027action\u0027 (bsc#1051510).\n- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).\n- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).\n- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).\n- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).\n- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).\n- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).\n- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).\n- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).\n- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).\n- media: s5k4ecgx: delete a bogus error message (bsc#1051510).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).\n- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).\n- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).\n- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).\n- media: uvcvideo: Fix \u0027type\u0027 check leading to overflow (bsc#1051510).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).\n- media: v4l2-tpg: array index could become negative (bsc#1051510).\n- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).\n- media: vb2: be sure to unlock mutex on errors (bsc#1051510).\n- media: vb2: vb2_mmap: move lock up (bsc#1051510).\n- media: vivid: fix error handling of kthread_run (bsc#1051510).\n- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).\n- media: vivid: set min width/height to a value \u003e 0 (bsc#1051510).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).\n- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).\n- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).\n- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).\n- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).\n- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).\n- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).\n- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).\n- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).\n- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).\n- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).\n- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).\n- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).\n- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).\n- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).\n- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).\n- misc: sram: enable clock before registering regions (bsc#1051510).\n- misc: sram: fix resource leaks in probe error path (bsc#1051510).\n- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).\n- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).\n- mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n- mlx4: trigger IB events needed by SMC (bnc#1117947, LTC#173662).\n- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).\n- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).\n- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).\n- mmap: relax file size limit for regular files (git fixes (mm/mmap)).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).\n- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).\n- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).\n- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).\n- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).\n- mmc: omap: fix the maximum timeout setting (bsc#1051510).\n- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).\n- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n- mmc: spi: Fix card detection during probe (bsc#1051510).\n- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).\n- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).\n- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).\n- mm/ksm.c: ignore STABLE_FLAG of rmap_item-\u003eaddress in rmap_walk_ksm() (git fixes (mm/ksm)).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).\n- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).\n- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)\n- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).\n- mm: migration: factor out code to compute expected number of page references (bsc#1084216).\n- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).\n- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).\n- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).\n- Moved patches.fixes/x86-add-tsx-force-abort-cpuid-msr.patch to patches.arch/ and added upstream tags (bsc#1129363) patches.arch/x86-add-tsx-force-abort-cpuid-msr\n- Move the upstreamed HD-audio fix into sorted section\n- mpt3sas: check sense buffer before copying sense data (bsc#1106811).\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).\n- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).\n- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).\n- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).\n- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).\n- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).\n- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).\n- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).\n- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).\n- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).\n- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).\n- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).\n- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).\n- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).\n- mtd: nand: ifc: update bufnum mask for ver \u003e= 2.0.0 (bsc#1051510).\n- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).\n- mtd: nand: omap2: Fix subpage write (bsc#1051510).\n- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).\n- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).\n- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).\n- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).\n- mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).\n- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).\n- mv88e6060: disable hardware level MAC learning (bsc#1051510).\n- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).\n- neighbour: Avoid writing before skb-\u003ehead in neigh_hh_output() (networking-stable-18_12_12).\n- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).\n- net: add uevent socket member (bsc#1122982).\n- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).\n- net: aquantia: fixed instack structure overflow (git-fixes).\n- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).\n- net: bcmgenet: abort suspend on error (bsc#1051510).\n- net: bcmgenet: code movement (bsc#1051510).\n- net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n- net: bcmgenet: return correct value \u0027ret\u0027 from bcmgenet_power_down (bsc#1051510).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).\n- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- net: do not call update_pmtu unconditionally (bsc#1123456).\n- net: Do not default Cavium PTP driver to \u0027y\u0027 (bsc#1110096).\n- net: dp83640: expire old TX-skb (networking-stable-19_02_10).\n- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).\n- net: ena: fix race between link up and device initalization (bsc#1083548).\n- netfilter: nf_tables: check the result of dereferencing base_chain-\u003estats (git-fixes).\n- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).\n- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).\n- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).\n- net: hns3: add handling for big TX fragment (bsc#1104353 ).\n- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).\n- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).\n- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).\n- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).\n- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).\n- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).\n- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).\n- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).\n- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).\n- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).\n- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).\n- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).\n- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).\n- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).\n- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).\n- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).\n- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Release resource on error flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).\n- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).\n- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).\n- netns: restrict uevents (bsc#1122982).\n- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).\n- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).\n- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).\n- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).\n- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).\n- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).\n- netrom: switch to sock timer API (bsc#1051510).\n- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).\n- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).\n- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).\n- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).\n- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).\n- net/smc: abort CLC connection in smc_release (bnc#1117947, LTC#173662).\n- net/smc: add infrastructure to send delete rkey messages (bnc#1117947, LTC#173662).\n- net/smc: add SMC-D shutdown signal (bnc#1117947, LTC#173662).\n- net/smc: allow fallback after clc timeouts (bnc#1117947, LTC#173662).\n- net/smc: atomic SMCD cursor handling (bnc#1117947, LTC#173662).\n- net/smc: avoid a delay by waiting for nothing (bnc#1117947, LTC#173662).\n- net/smc: cleanup listen worker mutex unlocking (bnc#1117947, LTC#173662).\n- net/smc: cleanup tcp_listen_worker initialization (bnc#1117947, LTC#173662).\n- net/smc: enable fallback for connection abort in state INIT (bnc#1117947, LTC#173662).\n- net/smc: fix non-blocking connect problem (bnc#1117947, LTC#173662).\n- net/smc: fix sizeof to int comparison (bnc#1117947, LTC#173662).\n- net/smc: fix smc_buf_unuse to use the lgr pointer (bnc#1117947, LTC#173662).\n- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).\n- net/smc: make smc_lgr_free() static (bnc#1117947, LTC#173662).\n- net/smc: no link delete for a never active link (bnc#1117947, LTC#173662).\n- net/smc: no urgent data check for listen sockets (bnc#1117947, LTC#173662).\n- net/smc: remove duplicate mutex_unlock (bnc#1117947, LTC#173662).\n- net/smc: remove sock_error detour in clc-functions (bnc#1117947, LTC#173662).\n- net/smc: short wait for late smc_clc_wait_msg (bnc#1117947, LTC#173662).\n- net/smc: unregister rkeys of unused buffer (bnc#1117947, LTC#173662).\n- net/smc: use after free fix in smc_wr_tx_put_slot() (bnc#1117947, LTC#173662).\n- net/smc: use queue pair number when matching link group (bnc#1117947, LTC#173662).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).\n- net: stmmac: Fix PCI module removal leak (git-fixes).\n- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).\n- net: stmmac: Use mutex instead of spinlock (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).\n- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).\n- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).\n- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).\n- nfit: acpi_nfit_ctl(): Check out_obj-\u003etype in the right place (bsc#1129547).\n- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).\n- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).\n- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n- nfs: Allow NFSv4 mounts to not share transports ().\n- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).\n- nfsd: Fix an Oops in free_session() (git-fixes).\n- nfs: Fix a missed page unlock after pg_doio() (git-fixes).\n- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).\n- nfs: support \u0027nosharetransport\u0027 option (bnc#807502, bnc#828192, ).\n- nfsv4.1: Fix the r/wsize checking (git-fixes).\n- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).\n- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).\n- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).\n- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).\n- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).\n- nvme: kABI fix for scan_lock (bsc#1123882).\n- nvme: lock NS list changes while handling command effects (bsc#1123882).\n- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).\n- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).\n- nvme-multipath: round-robin I/O policy (bsc#1110705).\n- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).\n- of, numa: Validate some distance map rules (bsc#1051510).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).\n- omap2fb: Fix stack memory disclosure (bsc#1120902)\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).\n- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).\n- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).\n- packet: Do not leak dev refcounts on error exit (git-fixes).\n- packet: validate address length if non-zero (networking-stable-19_01_04).\n- packet: validate address length (networking-stable-19_01_04).\n- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).\n- Partially revert \u0027block: fail op_is_write() requests to (bsc#1125252).\n- PCI: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).\n- PCI: Disable broken RTIT_BAR of Intel TH (bsc#1120318).\n- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).\n- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).\n- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).\n- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).\n- pcrypt: use format specifier in kobject_add (bsc#1051510).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).\n- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).\n- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).\n- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).\n- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).\n- phy: tegra: remove redundant self assignment of \u0027map\u0027 (bsc#1051510).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bsc#1051510).\n- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).\n- pinctrl: meson: fix pull enable register calculation (bsc#1051510).\n- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).\n- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).\n- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).\n- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).\n- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).\n- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).\n- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).\n- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).\n- powerpc: Add an option to disable static PCI bus numbering (bsc#1122159).\n- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).\n- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).\n- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).\n- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).\n- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).\n- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).\n- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).\n- powerpc/tm: Fix comment (bsc#1118338).\n- powerpc/tm: Fix endianness flip on trap (bsc#1118338).\n- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).\n- powerpc/tm: Fix HTM documentation (bsc#1118338).\n- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).\n- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).\n- powerpc/tm: Print 64-bits MSR (bsc#1118338).\n- powerpc/tm: Print scratch value (bsc#1118338).\n- powerpc/tm: Reformat comments (bsc#1118338).\n- powerpc/tm: Remove msr_tm_active() (bsc#1118338).\n- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).\n- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).\n- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).\n- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).\n- powerpc/tm: Update function prototype comment (bsc#1118338).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).\n- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).\n- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).\n- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).\n- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).\n- ptp_kvm: probe for kvm guest availability (bsc#1098382).\n- ptr_ring: wrap back -\u003eproducer in __ptr_ring_swap_queue() (networking-stable-19_01_04).\n- Put the xhci fix patch to the right place in the sorted section\n- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).\n- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).\n- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).\n- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).\n- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).\n- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).\n- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).\n- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).\n- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).\n- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).\n- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).\n- rdma/core: Fix unwinding flow in case of error to register device (bsc#1046306).\n- rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).\n- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).\n- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).\n- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).\n- Remove blacklist of virtio patch so we can install it (bsc#1114585)\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1051510).\n- Revert \u0027input: elan_i2c - add acpi ID for touchpad in ASUS Aspire F5-573G\u0027 (bsc#1051510).\n- Revert \u0027openvswitch: Fix template leak in error cases.\u0027 (bsc#1051510).\n- Revert \u0027scsi: qla2xxx: Fix NVMe Target discovery\u0027 (bsc#1125252).\n- Revert \u0027serial: 8250: Fix clearing FIFOs in RS485 mode again\u0027 (bsc#1051510).\n- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.\n- Revert \u0027xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue\u0027 (bsc#1120854).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).\n- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697) dracut has been using permissions 0600 for the initrd for a long time.\n- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)\n- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).\n- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).\n- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).\n- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).\n- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).\n- s390/early: improve machine detection (git-fixes).\n- s390/ism: clear dmbe_mask bit before SMC IRQ handling (bnc#1117947, LTC#173662).\n- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).\n- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).\n- s390/qeth: fix use-after-free in error path (bsc#1127534).\n- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).\n- s390/sthyi: Fix machine name validity indication (git-fixes).\n- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).\n- sata_rcar: fix deferred probing (bsc#1051510).\n- sbus: char: add of_node_put() (bsc#1051510).\n- sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).\n- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- sch_multiq: fix double free on init failure (bsc#1051510).\n- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).\n- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).\n- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).\n- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).\n- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).\n- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).\n- scsi: lpfc: fix remoteport access (bsc#1125252).\n- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).\n- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).\n- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).\n- scsi: mpt3sas: Add ioc_\u003clevel\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u003clevel\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u003clevel\u003e with MPT3SAS_FMT to ioc_\u003clevel\u003e (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).\n- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).\n- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).\n- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).\n- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).\n- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).\n- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).\n- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).\n- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).\n- scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).\n- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).\n- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).\n- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).\n- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).\n- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).\n- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).\n- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).\n- sctp: kfree_rcu asoc (networking-stable-18_12_12).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).\n- selftests/livepatch: introduce tests (bsc#1071995).\n- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).\n- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).\n- selinux: always allow mounting submounts (bsc#1051510).\n- selinux: fix GPF on invalid policy (bsc#1051510).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).\n- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).\n- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).\n- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).\n- serial: imx: fix error handling in console_setup (bsc#1051510).\n- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).\n- serial/sunsu: fix refcount leak (bsc#1051510).\n- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).\n- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).\n- signal: Always deliver the kernel\u0027s SIGKILL and SIGSTOP to a pid namespace init (git-fixes).\n- skge: potential memory corruption in skge_get_regs() (bsc#1051510).\n- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).\n- sky2: Increase D3 delay again (bsc#1051510).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).\n- smb3.1.1 dialect is no longer experimental (bsc#1051510).\n- smb311: Fix reconnect (bsc#1051510).\n- smb311: Improve checking of negotiate security contexts (bsc#1051510).\n- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).\n- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).\n- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).\n- smb3: check for and properly advertise directory lease support (bsc#1051510).\n- smb3: directory sync should not return an error (bsc#1051510).\n- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).\n- smb3: do not request leases in symlink creation and query (bsc#1051510).\n- smb3: Do not send smb3 SET_INFO if nothing changed (bsc#1051510).\n- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).\n- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).\n- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).\n- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).\n- smb3: fix various xid leaks (bsc#1051510).\n- smb3: Improve security, move default dialect to smb3 from old CIFS (bsc#1051510).\n- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).\n- smb3: Remove ifdef since smb3 (and later) now STRONGLY preferred (bsc#1051510).\n- smb3: remove noisy warning message on mount (bsc#1129664).\n- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).\n- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).\n- soc/tegra: Do not leak device tree node reference (bsc#1051510).\n- splice: do not merge into linked buffers (git-fixes).\n- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).\n- staging: iio: ad7780: update voltage on read (bsc#1051510).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).\n- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).\n- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).\n- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).\n- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).\n- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).\n- staging: speakup: Replace strncpy with memcpy (bsc#1051510).\n- staging: wilc1000: fix to set correct value for \u0027vif_num\u0027 (bsc#1051510).\n- sunrpc: correct the computation for page_ptr when truncating (git-fixes).\n- sunrpc: Fix a potential race in xprt_connect() (git-fixes).\n- sunrpc: Fix leak of krb5p encode pages (git-fixes).\n- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).\n- sunrpc: safely reallow resvport min/max inversion (git-fixes).\n- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).\n- swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).\n- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).\n- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).\n- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).\n- tcp: batch tcp_net_metrics_exit (bsc#1122982).\n- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).\n- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).\n- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).\n- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).\n- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).\n- tcp: lack of available data can also cause TSO defer (git-fixes).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).\n- team: Free BPF filter when unregistering netdev (bsc#1051510).\n- thermal: do not clear passive state during system sleep (bsc#1051510).\n- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).\n- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).\n- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).\n- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).\n- thermal: mediatek: fix register index error (bsc#1051510).\n- timekeeping: Use proper seqcount initializer (bsc#1051510).\n- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).\n- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).\n- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).\n- tipc: fix a double kfree_skb() (networking-stable-19_01_04).\n- tipc: fix a race condition of releasing subscriber object (bsc#1051510).\n- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).\n- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).\n- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).\n- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).\n- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).\n- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).\n- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).\n- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).\n- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).\n- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).\n- Tree connect for smb3.1.1 must be signed for non-encrypted shares (bsc#1051510).\n- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).\n- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).\n- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).\n- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).\n- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).\n- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).\n- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).\n- uevent: add alloc_uevent_skb() helper (bsc#1122982).\n- Update config files. Remove conditional support for smb2 and SMB3:\n- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).\n- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).\n- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.\n- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).\n- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).\n- usb: Add new USB LPM helpers (bsc#1120902).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).\n- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).\n- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).\n- usb: dwc3: gadget: Clear req-\u003eneeds_extra_trb flag on cleanup (bsc#1120902).\n- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).\n- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).\n- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).\n- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).\n- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).\n- usb: musb: dsps: fix otg state machine (bsc#1051510).\n- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).\n- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).\n- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n- usb: phy: am335x: fix race condition in _probe (bsc#1051510).\n- usb: serial: option: add Fibocom NL678 series (bsc#1120902).\n- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).\n- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).\n- usb: storage: add quirk for SMI SM3350 (bsc#1120902).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).\n- usb: xhci: fix \u0027broken_suspend\u0027 placement in struct xchi_hcd (bsc#1119086).\n- veth: set peer GSO values (bsc#1051510).\n- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n- vfio: ccw: process ssch with interrupts disabled (git-fixes).\n- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).\n- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).\n- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).\n- vhost: log dirty page correctly (networking-stable-19_01_26).\n- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).\n- vhost/vsock: fix uninitialized vhost_vsock-\u003eguest_cid (bsc#1051510).\n- video: clps711x-fb: release disp device node in probe() (bsc#1051510).\n- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).\n- virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).\n- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).\n- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).\n- virtio/s390: avoid race on vcdev-\u003econfig (git-fixes).\n- virtio/s390: fix race in ccw_io_helper() (git-fixes).\n- vmci: Support upto 64-bit PPNs (bsc#1127286).\n- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).\n- vsock: Send reset control packet when socket is partially bound (networking-stable-19_01_04).\n- vt: invoke notifier on screen size change (bsc#1051510).\n- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).\n- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling gro_cells_receive() (git-fixes).\n- vxlan: update skb dst pmtu on tx path (bsc#1123456).\n- w90p910_ether: remove incorrect __init annotation (bsc#1051510).\n- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).\n- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/amd_nb: Add PCI device IDs for family 17h, model 30h ().\n- x86/amd_nb: Add support for newer PCI topologies ().\n- x86/a.out: Clear the dump structure initially (bsc#1114279).\n- x86/apic: Provide apic_ack_irq() (bsc#1122822).\n- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).\n- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).\n- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).\n- x86/bugs: Add AMD\u0027s variant of SSB_NO (bsc#1114279).\n- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).\n- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).\n- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).\n- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).\n- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).\n- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).\n- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).\n- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).\n- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).\n- x86/vdso: Remove obsolete \u0027fake section table\u0027 reservation (bsc#1114279).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).\n- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).\n- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: fix dom0 boot on huge systems (bsc#1127836).\n- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).\n- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).\n- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).\n- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).\n- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).\n- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).\n- Yama: Check for pid death before checking ancestry (bsc#1051510).\n- yam: fix a missing-check bug (bsc#1051510).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).\n- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-765,SUSE-SLE-DESKTOP-12-SP4-2019-765,SUSE-SLE-HA-12-SP4-2019-765,SUSE-SLE-Live-Patching-12-SP4-2019-765,SUSE-SLE-SDK-12-SP4-2019-765,SUSE-SLE-SERVER-12-SP4-2019-765,SUSE-SLE-WE-12-SP4-2019-765", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0765-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0765-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190765-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0765-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050252", "url": "https://bugzilla.suse.com/1050252" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1054610", "url": "https://bugzilla.suse.com/1054610" }, { "category": "self", "summary": "SUSE Bug 1055121", "url": "https://bugzilla.suse.com/1055121" }, { "category": "self", "summary": "SUSE Bug 1056658", "url": "https://bugzilla.suse.com/1056658" }, { "category": "self", "summary": "SUSE Bug 1056662", "url": "https://bugzilla.suse.com/1056662" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1063638", "url": "https://bugzilla.suse.com/1063638" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1070995", "url": "https://bugzilla.suse.com/1070995" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1074562", "url": "https://bugzilla.suse.com/1074562" }, { "category": "self", "summary": "SUSE Bug 1074578", "url": "https://bugzilla.suse.com/1074578" }, { "category": "self", "summary": "SUSE Bug 1074701", "url": "https://bugzilla.suse.com/1074701" }, { "category": "self", "summary": "SUSE Bug 1075006", "url": "https://bugzilla.suse.com/1075006" }, { "category": "self", "summary": "SUSE Bug 1075419", "url": "https://bugzilla.suse.com/1075419" }, { "category": "self", "summary": "SUSE Bug 1075748", "url": "https://bugzilla.suse.com/1075748" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1080039", "url": "https://bugzilla.suse.com/1080039" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1084216", "url": "https://bugzilla.suse.com/1084216" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087084", "url": "https://bugzilla.suse.com/1087084" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1087939", "url": "https://bugzilla.suse.com/1087939" }, { "category": "self", "summary": "SUSE Bug 1088133", "url": "https://bugzilla.suse.com/1088133" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098382", "url": "https://bugzilla.suse.com/1098382" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1102055", "url": "https://bugzilla.suse.com/1102055" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106434", "url": "https://bugzilla.suse.com/1106434" }, { "category": "self", "summary": "SUSE Bug 1106811", "url": "https://bugzilla.suse.com/1106811" }, { "category": "self", "summary": "SUSE Bug 1107078", "url": "https://bugzilla.suse.com/1107078" }, { "category": "self", "summary": "SUSE Bug 1107665", "url": "https://bugzilla.suse.com/1107665" }, { "category": "self", "summary": "SUSE Bug 1108101", "url": "https://bugzilla.suse.com/1108101" }, { "category": "self", "summary": "SUSE Bug 1108870", "url": "https://bugzilla.suse.com/1108870" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1110096", "url": "https://bugzilla.suse.com/1110096" }, { "category": "self", "summary": "SUSE Bug 1110705", "url": "https://bugzilla.suse.com/1110705" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1113042", "url": "https://bugzilla.suse.com/1113042" }, { "category": "self", "summary": "SUSE Bug 1113712", "url": "https://bugzilla.suse.com/1113712" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113769", "url": "https://bugzilla.suse.com/1113769" }, { "category": "self", "summary": "SUSE Bug 1113939", "url": "https://bugzilla.suse.com/1113939" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114585", "url": "https://bugzilla.suse.com/1114585" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117155", "url": "https://bugzilla.suse.com/1117155" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1117947", "url": "https://bugzilla.suse.com/1117947" }, { "category": "self", "summary": "SUSE Bug 1118338", "url": "https://bugzilla.suse.com/1118338" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119086", "url": "https://bugzilla.suse.com/1119086" }, { "category": "self", "summary": "SUSE Bug 1119766", "url": "https://bugzilla.suse.com/1119766" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120008", "url": "https://bugzilla.suse.com/1120008" }, { "category": "self", "summary": "SUSE Bug 1120318", "url": "https://bugzilla.suse.com/1120318" }, { "category": "self", "summary": "SUSE Bug 1120601", "url": "https://bugzilla.suse.com/1120601" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120854", "url": "https://bugzilla.suse.com/1120854" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1120909", "url": "https://bugzilla.suse.com/1120909" }, { "category": "self", "summary": "SUSE Bug 1120955", "url": "https://bugzilla.suse.com/1120955" }, { "category": "self", "summary": "SUSE Bug 1121317", "url": "https://bugzilla.suse.com/1121317" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1121789", "url": "https://bugzilla.suse.com/1121789" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122019", "url": "https://bugzilla.suse.com/1122019" }, { "category": "self", "summary": "SUSE Bug 1122159", "url": "https://bugzilla.suse.com/1122159" }, { "category": "self", "summary": "SUSE Bug 1122192", "url": "https://bugzilla.suse.com/1122192" }, { "category": "self", "summary": "SUSE Bug 1122292", "url": "https://bugzilla.suse.com/1122292" }, { "category": "self", "summary": "SUSE Bug 1122324", "url": "https://bugzilla.suse.com/1122324" }, { "category": "self", "summary": "SUSE Bug 1122554", "url": "https://bugzilla.suse.com/1122554" }, { "category": "self", "summary": "SUSE Bug 1122662", "url": "https://bugzilla.suse.com/1122662" }, { "category": "self", "summary": "SUSE Bug 1122764", "url": "https://bugzilla.suse.com/1122764" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122822", "url": "https://bugzilla.suse.com/1122822" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1122927", "url": "https://bugzilla.suse.com/1122927" }, { "category": "self", "summary": "SUSE Bug 1122944", "url": "https://bugzilla.suse.com/1122944" }, { "category": "self", "summary": "SUSE Bug 1122971", "url": "https://bugzilla.suse.com/1122971" }, { "category": "self", "summary": "SUSE Bug 1122982", "url": "https://bugzilla.suse.com/1122982" }, { "category": "self", "summary": "SUSE Bug 1123060", "url": "https://bugzilla.suse.com/1123060" }, { "category": "self", "summary": "SUSE Bug 1123061", "url": "https://bugzilla.suse.com/1123061" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1123317", "url": "https://bugzilla.suse.com/1123317" }, { "category": "self", "summary": "SUSE Bug 1123348", "url": "https://bugzilla.suse.com/1123348" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE Bug 1123456", "url": "https://bugzilla.suse.com/1123456" }, { "category": "self", "summary": "SUSE Bug 1123538", "url": "https://bugzilla.suse.com/1123538" }, { "category": "self", "summary": "SUSE Bug 1123697", "url": "https://bugzilla.suse.com/1123697" }, { "category": "self", "summary": "SUSE Bug 1123882", "url": "https://bugzilla.suse.com/1123882" }, { "category": "self", "summary": "SUSE Bug 1123933", "url": "https://bugzilla.suse.com/1123933" }, { "category": "self", "summary": "SUSE Bug 1124055", "url": "https://bugzilla.suse.com/1124055" }, { "category": "self", "summary": "SUSE Bug 1124204", "url": "https://bugzilla.suse.com/1124204" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124579", "url": "https://bugzilla.suse.com/1124579" }, { "category": "self", "summary": "SUSE Bug 1124589", "url": "https://bugzilla.suse.com/1124589" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1124969", "url": "https://bugzilla.suse.com/1124969" }, { "category": "self", "summary": "SUSE Bug 1124974", "url": "https://bugzilla.suse.com/1124974" }, { "category": "self", "summary": "SUSE Bug 1124975", "url": "https://bugzilla.suse.com/1124975" }, { "category": "self", "summary": "SUSE Bug 1124976", "url": "https://bugzilla.suse.com/1124976" }, { "category": "self", "summary": "SUSE Bug 1124978", "url": "https://bugzilla.suse.com/1124978" }, { "category": "self", "summary": "SUSE Bug 1124979", "url": "https://bugzilla.suse.com/1124979" }, { "category": "self", "summary": "SUSE Bug 1124980", "url": "https://bugzilla.suse.com/1124980" }, { "category": "self", "summary": "SUSE Bug 1124981", "url": "https://bugzilla.suse.com/1124981" }, { "category": "self", "summary": "SUSE Bug 1124982", "url": "https://bugzilla.suse.com/1124982" }, { "category": "self", "summary": "SUSE Bug 1124984", "url": "https://bugzilla.suse.com/1124984" }, { "category": "self", "summary": "SUSE Bug 1124985", "url": "https://bugzilla.suse.com/1124985" }, { "category": "self", "summary": "SUSE Bug 1125109", "url": "https://bugzilla.suse.com/1125109" }, { "category": "self", "summary": "SUSE Bug 1125125", "url": "https://bugzilla.suse.com/1125125" }, { "category": "self", "summary": "SUSE Bug 1125252", "url": "https://bugzilla.suse.com/1125252" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125614", "url": "https://bugzilla.suse.com/1125614" }, { "category": "self", "summary": "SUSE Bug 1125728", "url": "https://bugzilla.suse.com/1125728" }, { "category": "self", "summary": "SUSE Bug 1125780", "url": "https://bugzilla.suse.com/1125780" }, { "category": "self", "summary": "SUSE Bug 1125797", "url": "https://bugzilla.suse.com/1125797" }, { "category": "self", "summary": "SUSE Bug 1125799", "url": "https://bugzilla.suse.com/1125799" }, { "category": "self", "summary": "SUSE Bug 1125800", "url": "https://bugzilla.suse.com/1125800" }, { "category": "self", "summary": "SUSE Bug 1125907", "url": "https://bugzilla.suse.com/1125907" }, { "category": "self", "summary": "SUSE Bug 1125947", "url": "https://bugzilla.suse.com/1125947" }, { "category": "self", "summary": "SUSE Bug 1126131", "url": "https://bugzilla.suse.com/1126131" }, { "category": "self", "summary": "SUSE Bug 1126209", "url": "https://bugzilla.suse.com/1126209" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126393", "url": "https://bugzilla.suse.com/1126393" }, { "category": "self", "summary": "SUSE Bug 1126476", "url": "https://bugzilla.suse.com/1126476" }, { "category": "self", "summary": "SUSE Bug 1126480", "url": "https://bugzilla.suse.com/1126480" }, { "category": "self", "summary": "SUSE Bug 1126481", "url": "https://bugzilla.suse.com/1126481" }, { "category": "self", "summary": "SUSE Bug 1126488", "url": "https://bugzilla.suse.com/1126488" }, { "category": "self", "summary": "SUSE Bug 1126495", "url": "https://bugzilla.suse.com/1126495" }, { "category": "self", "summary": "SUSE Bug 1126555", "url": "https://bugzilla.suse.com/1126555" }, { "category": "self", "summary": "SUSE Bug 1126579", "url": "https://bugzilla.suse.com/1126579" }, { "category": "self", "summary": "SUSE Bug 1126789", "url": "https://bugzilla.suse.com/1126789" }, { "category": "self", "summary": "SUSE Bug 1126790", "url": "https://bugzilla.suse.com/1126790" }, { "category": "self", "summary": "SUSE Bug 1126802", "url": "https://bugzilla.suse.com/1126802" }, { "category": "self", "summary": "SUSE Bug 1126803", "url": "https://bugzilla.suse.com/1126803" }, { "category": "self", "summary": "SUSE Bug 1126804", "url": "https://bugzilla.suse.com/1126804" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1126806", "url": "https://bugzilla.suse.com/1126806" }, { "category": "self", "summary": "SUSE Bug 1126807", "url": "https://bugzilla.suse.com/1126807" }, { "category": "self", "summary": "SUSE Bug 1127042", "url": "https://bugzilla.suse.com/1127042" }, { "category": "self", "summary": "SUSE Bug 1127062", "url": "https://bugzilla.suse.com/1127062" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127154", "url": "https://bugzilla.suse.com/1127154" }, { "category": "self", "summary": "SUSE Bug 1127285", "url": "https://bugzilla.suse.com/1127285" }, { "category": "self", "summary": "SUSE Bug 1127286", "url": "https://bugzilla.suse.com/1127286" }, { "category": "self", "summary": "SUSE Bug 1127307", "url": "https://bugzilla.suse.com/1127307" }, { "category": "self", "summary": "SUSE Bug 1127363", "url": "https://bugzilla.suse.com/1127363" }, { "category": "self", "summary": "SUSE Bug 1127493", "url": "https://bugzilla.suse.com/1127493" }, { "category": "self", "summary": "SUSE Bug 1127494", "url": "https://bugzilla.suse.com/1127494" }, { "category": "self", "summary": "SUSE Bug 1127495", "url": "https://bugzilla.suse.com/1127495" }, { "category": "self", "summary": "SUSE Bug 1127496", "url": "https://bugzilla.suse.com/1127496" }, { "category": "self", "summary": "SUSE Bug 1127497", "url": "https://bugzilla.suse.com/1127497" }, { "category": "self", "summary": "SUSE Bug 1127498", "url": "https://bugzilla.suse.com/1127498" }, { "category": "self", "summary": "SUSE Bug 1127534", "url": "https://bugzilla.suse.com/1127534" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127567", "url": "https://bugzilla.suse.com/1127567" }, { "category": "self", "summary": "SUSE Bug 1127595", "url": "https://bugzilla.suse.com/1127595" }, { "category": "self", "summary": "SUSE Bug 1127603", "url": "https://bugzilla.suse.com/1127603" }, { "category": "self", "summary": "SUSE Bug 1127682", "url": "https://bugzilla.suse.com/1127682" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127750", "url": "https://bugzilla.suse.com/1127750" }, { "category": "self", "summary": "SUSE Bug 1127836", "url": "https://bugzilla.suse.com/1127836" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128094", "url": "https://bugzilla.suse.com/1128094" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128351", "url": "https://bugzilla.suse.com/1128351" }, { "category": "self", "summary": "SUSE Bug 1128451", "url": "https://bugzilla.suse.com/1128451" }, { "category": "self", "summary": "SUSE Bug 1128895", "url": "https://bugzilla.suse.com/1128895" }, { "category": "self", "summary": "SUSE Bug 1129046", "url": "https://bugzilla.suse.com/1129046" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129163", "url": "https://bugzilla.suse.com/1129163" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129181", "url": "https://bugzilla.suse.com/1129181" }, { "category": "self", "summary": "SUSE Bug 1129182", "url": "https://bugzilla.suse.com/1129182" }, { "category": "self", "summary": "SUSE Bug 1129183", "url": "https://bugzilla.suse.com/1129183" }, { "category": "self", "summary": "SUSE Bug 1129184", "url": "https://bugzilla.suse.com/1129184" }, { "category": "self", "summary": "SUSE Bug 1129205", "url": "https://bugzilla.suse.com/1129205" }, { "category": "self", "summary": "SUSE Bug 1129281", "url": "https://bugzilla.suse.com/1129281" }, { "category": "self", "summary": "SUSE Bug 1129284", "url": "https://bugzilla.suse.com/1129284" }, { "category": "self", "summary": "SUSE Bug 1129285", "url": "https://bugzilla.suse.com/1129285" }, { "category": "self", "summary": "SUSE Bug 1129291", "url": "https://bugzilla.suse.com/1129291" }, { "category": "self", "summary": "SUSE Bug 1129292", "url": "https://bugzilla.suse.com/1129292" }, { "category": "self", "summary": "SUSE Bug 1129293", "url": "https://bugzilla.suse.com/1129293" }, { "category": "self", "summary": "SUSE Bug 1129294", "url": "https://bugzilla.suse.com/1129294" }, { "category": "self", "summary": "SUSE Bug 1129295", "url": "https://bugzilla.suse.com/1129295" }, { "category": "self", "summary": "SUSE Bug 1129296", "url": "https://bugzilla.suse.com/1129296" }, { "category": "self", "summary": "SUSE Bug 1129326", "url": "https://bugzilla.suse.com/1129326" }, { "category": "self", "summary": "SUSE Bug 1129327", "url": "https://bugzilla.suse.com/1129327" }, { "category": "self", "summary": "SUSE Bug 1129330", "url": "https://bugzilla.suse.com/1129330" }, { "category": "self", "summary": "SUSE Bug 1129363", "url": "https://bugzilla.suse.com/1129363" }, { "category": "self", "summary": "SUSE Bug 1129366", "url": "https://bugzilla.suse.com/1129366" }, { "category": "self", "summary": "SUSE Bug 1129497", "url": "https://bugzilla.suse.com/1129497" }, { "category": "self", "summary": "SUSE Bug 1129519", "url": "https://bugzilla.suse.com/1129519" }, { "category": "self", "summary": "SUSE Bug 1129543", "url": "https://bugzilla.suse.com/1129543" }, { "category": "self", "summary": "SUSE Bug 1129547", "url": "https://bugzilla.suse.com/1129547" }, { "category": "self", "summary": "SUSE Bug 1129551", "url": "https://bugzilla.suse.com/1129551" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129625", "url": "https://bugzilla.suse.com/1129625" }, { "category": "self", "summary": "SUSE Bug 1129664", "url": "https://bugzilla.suse.com/1129664" }, { "category": "self", "summary": "SUSE Bug 1129739", "url": "https://bugzilla.suse.com/1129739" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 807502", "url": "https://bugzilla.suse.com/807502" }, { "category": "self", "summary": "SUSE Bug 824948", "url": "https://bugzilla.suse.com/824948" }, { "category": "self", "summary": "SUSE Bug 828192", "url": "https://bugzilla.suse.com/828192" }, { "category": "self", "summary": "SUSE Bug 925178", "url": "https://bugzilla.suse.com/925178" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20669 page", "url": "https://www.suse.com/security/cve/CVE-2018-20669/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7308 page", "url": "https://www.suse.com/security/cve/CVE-2019-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8980 page", "url": "https://www.suse.com/security/cve/CVE-2019-8980/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-03-26T17:00:55Z", "generator": { "date": "2019-03-26T17:00:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0765-1", "initial_release_date": "2019-03-26T17:00:55Z", "revision_history": [ { "date": "2019-03-26T17:00:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.13.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.13.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.13.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-al-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-al-4.12.14-95.13.1.aarch64", "product_id": "dtb-al-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-allwinner-4.12.14-95.13.1.aarch64", "product_id": "dtb-allwinner-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-altera-4.12.14-95.13.1.aarch64", "product_id": "dtb-altera-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-amd-4.12.14-95.13.1.aarch64", "product_id": "dtb-amd-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-amlogic-4.12.14-95.13.1.aarch64", "product_id": "dtb-amlogic-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-apm-4.12.14-95.13.1.aarch64", "product_id": "dtb-apm-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-arm-4.12.14-95.13.1.aarch64", "product_id": "dtb-arm-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-broadcom-4.12.14-95.13.1.aarch64", "product_id": "dtb-broadcom-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-cavium-4.12.14-95.13.1.aarch64", "product_id": "dtb-cavium-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-exynos-4.12.14-95.13.1.aarch64", "product_id": "dtb-exynos-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-freescale-4.12.14-95.13.1.aarch64", "product_id": "dtb-freescale-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-hisilicon-4.12.14-95.13.1.aarch64", "product_id": "dtb-hisilicon-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-lg-4.12.14-95.13.1.aarch64", "product_id": "dtb-lg-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-marvell-4.12.14-95.13.1.aarch64", "product_id": "dtb-marvell-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-mediatek-4.12.14-95.13.1.aarch64", "product_id": "dtb-mediatek-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-nvidia-4.12.14-95.13.1.aarch64", "product_id": "dtb-nvidia-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-qcom-4.12.14-95.13.1.aarch64", "product_id": "dtb-qcom-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-renesas-4.12.14-95.13.1.aarch64", "product_id": "dtb-renesas-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-rockchip-4.12.14-95.13.1.aarch64", "product_id": "dtb-rockchip-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-socionext-4.12.14-95.13.1.aarch64", "product_id": "dtb-socionext-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-sprd-4.12.14-95.13.1.aarch64", "product_id": "dtb-sprd-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-xilinx-4.12.14-95.13.1.aarch64", "product_id": "dtb-xilinx-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-zte-4.12.14-95.13.1.aarch64", "product_id": "dtb-zte-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.13.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.13.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.13.1.aarch64", "product_id": "kernel-default-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.13.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.13.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.13.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.13.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.13.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.13.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.13.1.aarch64", "product_id": "kernel-syms-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.13.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.13.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.13.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.13.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.13.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.13.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.13.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.13.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.13.1.noarch", "product_id": "kernel-devel-4.12.14-95.13.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.13.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.13.1.noarch", "product_id": "kernel-docs-4.12.14-95.13.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.13.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.13.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.13.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.13.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.13.1.noarch", "product_id": "kernel-macros-4.12.14-95.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.13.1.noarch", "product": { "name": "kernel-source-4.12.14-95.13.1.noarch", "product_id": "kernel-source-4.12.14-95.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.13.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.13.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.13.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.12.14-95.13.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.12.14-95.13.1.ppc64le", "product_id": "dlm-kmp-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.13.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.13.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.12.14-95.13.1.ppc64le", "product_id": "gfs2-kmp-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.13.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.13.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.13.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-debug-extra-4.12.14-95.13.1.ppc64le", "product_id": "kernel-debug-extra-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.12.14-95.13.1.ppc64le", "product_id": "kernel-debug-kgraft-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.13.1.ppc64le", "product_id": "kernel-default-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.13.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.13.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.13.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.13.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.13.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.13.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.13.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.13.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.13.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.13.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "kselftests-kmp-debug-4.12.14-95.13.1.ppc64le", "product_id": "kselftests-kmp-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.13.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.13.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.12.14-95.13.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.13.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.13.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.13.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.13.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.13.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.13.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-4.12.14-95.13.1.s390x", "product_id": "kernel-default-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.13.1.s390x", "product_id": "kernel-default-base-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.13.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.13.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.13.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.13.1.s390x", "product_id": "kernel-default-man-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.13.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.13.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.13.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.13.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.13.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.13.1.s390x", "product_id": "kernel-syms-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.13.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.13.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.13.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.13.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.13.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.13.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.13.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.13.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.13.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.13.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.13.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.13.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.13.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.13.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.12.14-95.13.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.12.14-95.13.1.x86_64", "product_id": "cluster-md-kmp-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.12.14-95.13.1.x86_64", "product": { "name": "dlm-kmp-debug-4.12.14-95.13.1.x86_64", "product_id": "dlm-kmp-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.13.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.13.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.12.14-95.13.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.12.14-95.13.1.x86_64", "product_id": "gfs2-kmp-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.13.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.13.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.13.1.x86_64", "product_id": "kernel-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.13.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.13.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-debug-extra-4.12.14-95.13.1.x86_64", "product_id": "kernel-debug-extra-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.12.14-95.13.1.x86_64", "product_id": "kernel-debug-kgraft-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.13.1.x86_64", "product_id": "kernel-default-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.13.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.13.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.13.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.13.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.13.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.13.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.13.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.13.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.13.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.13.1.x86_64", "product_id": "kernel-syms-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.13.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.13.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.13.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.12.14-95.13.1.x86_64", "product": { "name": "kselftests-kmp-debug-4.12.14-95.13.1.x86_64", "product_id": "kselftests-kmp-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.13.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.13.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.12.14-95.13.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.12.14-95.13.1.x86_64", "product_id": "ocfs2-kmp-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-docs-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2018-20669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20669" } ], "notes": [ { "category": "general", "text": "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20669", "url": "https://www.suse.com/security/cve/CVE-2018-20669" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2018-20669", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "important" } ], "title": "CVE-2018-20669" }, { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-3819" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "important" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "important" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7308" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7308", "url": "https://www.suse.com/security/cve/CVE-2019-7308" }, { "category": "external", "summary": "SUSE Bug 1124055 for CVE-2019-7308", "url": "https://bugzilla.suse.com/1124055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "important" } ], "title": "CVE-2019-7308" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "important" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-8980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8980" } ], "notes": [ { "category": "general", "text": "A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8980", "url": "https://www.suse.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "SUSE Bug 1126209 for CVE-2019-8980", "url": "https://bugzilla.suse.com/1126209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "low" } ], "title": "CVE-2019-8980" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
suse-su-2019:0901-1
Vulnerability from csaf_suse
Published
2019-04-08 09:49
Modified
2019-04-08 09:49
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.176 to receive various security and bugfixes.
The following security bugs were fixed:
- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free. (bnc#1124728)
- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).
- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).
- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host's stack memory contents to a guest (bsc#1124735).
- CVE-2017-18249: The add_free_nid function in fs/f2fs/node.c did not properly track an allocated nid, which allowed local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads (bnc#1087036).
The following non-security bugs were fixed:
- acpi/nfit: Block function zero DSMs (bsc#1123321).
- acpi, nfit: Fix ARS overflow continuation (bsc#1125000).
- acpi/nfit: fix cmd_rc for acpi_nfit_ctl to always return a value (bsc#1124775).
- acpi/nfit: Fix command-supported detection (bsc#1123323).
- acpi: power: Skip duplicate power resource references in _PRx (bnc#1012382).
- acpi / processor: Fix the return value of acpi_processor_ids_walk() (git fixes (acpi)).
- alpha: Fix Eiger NR_IRQS to 128 (bnc#1012382).
- alpha: fix page fault handling for r16-r18 targets (bnc#1012382).
- alsa: bebob: fix model-id of unit for Apogee Ensemble (bnc#1012382).
- alsa: compress: Fix stop handling on compressed capture streams (bnc#1012382).
- alsa: hda - Add quirk for HP EliteBook 840 G5 (bnc#1012382).
- alsa: hda/realtek - Disable headset Mic VREF for headset mode of ALC225 (bnc#1012382).
- alsa: hda - Serialize codec registrations (bnc#1012382).
- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bnc#1012382).
- ARC: perf: map generic branches to correct hardware condition (bnc#1012382).
- arm64: Do not trap host pointer auth use to EL2 (bnc#1012382).
- arm64: ftrace: do not adjust the LR value (bnc#1012382).
- arm64: hyp-stub: Forbid kprobing of the hyp-stub (bnc#1012382).
- arm64/kvm: consistently handle host HCR_EL2 flags (bnc#1012382).
- arm64: KVM: Skip MMIO insn after emulation (bnc#1012382).
- arm64: perf: set suppress_bind_attrs flag to true (bnc#1012382).
- ARM: 8808/1: kexec:offline panic_smp_self_stop CPU (bnc#1012382).
- ARM: cns3xxx: Fix writing to wrong PCI config registers after alignment (bnc#1012382).
- ARM: dts: da850-evm: Correct the sound card name (bnc#1012382).
- ARM: dts: Fix OMAP4430 SDP Ethernet startup (bnc#1012382).
- ARM: dts: kirkwood: Fix polarity of GPIO fan lines (bnc#1012382).
- ARM: dts: mmp2: fix TWSI2 (bnc#1012382).
- ARM: iop32x/n2100: fix PCI IRQ mapping (bnc#1012382).
- ARM: OMAP2+: hwmod: Fix some section annotations (bnc#1012382).
- ARM: pxa: avoid section mismatch warning (bnc#1012382).
- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bnc#1012382).
- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bnc#1012382).
- ASoC: Intel: mrfld: fix uninitialized variable access (bnc#1012382).
- ata: Fix racy link clearance (bsc#1107866).
- ax25: fix possible use-after-free (bnc#1012382).
- batman-adv: Avoid WARN on net_device without parent in netns (bnc#1012382).
- batman-adv: Force mac header to start of data on xmit (bnc#1012382).
- block_dev: fix crash on chained bios with O_DIRECT (bsc#1090435).
- block: do not use bio->bi_vcnt to figure out segment number (bsc#1128893).
- block/loop: Use global lock for ioctl() operation (bnc#1012382).
- block/swim3: Fix -EBUSY error when re-opening device after unmount (Git-fixes).
- bluetooth: Fix unnecessary error message for HCI request completion (bnc#1012382).
- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).
- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).
- bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1012382).
- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128452).
- btrfs: tree-checker: Check level for leaves and nodes (bnc#1012382).
- btrfs: tree-checker: Do not check max block group size as current max chunk size limit is unreliable (fixes for bnc#1012382 bsc#1102875 bsc#1102877 bsc#1102879 bsc#1102882 bsc#1102896).
- btrfs: tree-checker: Fix misleading group system information (bnc#1012382).
- btrfs: tree-check: reduce stack consumption in check_dir_item (bnc#1012382).
- btrfs: validate type when reading a chunk (bnc#1012382).
- btrfs: wait on ordered extents on abort cleanup (bnc#1012382).
- can: bcm: check timer values before ktime conversion (bnc#1012382).
- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bnc#1012382).
- can: gw: ensure DLC boundaries after CAN frame modification (bnc#1012382).
- ceph: avoid repeatedly adding inode to mdsc->snap_flush_list (bsc#1126773).
- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125809).
- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).
- char/mwave: fix potential Spectre v1 vulnerability (bnc#1012382).
- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).
- cifs: Always resolve hostname before reconnecting (bnc#1012382).
- cifs: check ntwrk_buf_start for NULL before dereferencing it (bnc#1012382).
- cifs: Do not count -ENODATA as failure for query directory (bnc#1012382).
- cifs: Do not hide EINTR after sending network packets (bnc#1012382).
- cifs: Fix possible hang during async MTU reads and writes (bnc#1012382).
- cifs: Fix potential OOB access of lock element array (bnc#1012382).
- cifs: Limit memory used by lock request calls to a page (bnc#1012382).
- clk: imx6q: reset exclusive gates on init (bnc#1012382).
- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bnc#1012382).
- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).
- cpufreq: intel_pstate: Fix HWP on boot CPU after system resume (bsc#1120017).
- cpuidle: big.LITTLE: fix refcount leak (bnc#1012382).
- crypto: authencesn - Avoid twice completion call in decrypt path (bnc#1012382).
- crypto: authenc - fix parsing key with misaligned rta_len (bnc#1012382).
- crypto: cts - fix crash on short inputs (bnc#1012382).
- crypto: user - support incremental algorithm dumps (bsc#1120902).
- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bnc#1012382).
- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bnc#1012382).
- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bnc#1012382).
- dccp: fool proof ccid_hc_[rt]x_parse_options() (bnc#1012382).
- debugfs: fix debugfs_rename parameter checking (bnc#1012382).
- device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1129770).
- Disable MSI also when pcie-octeon.pcie_disable on (bnc#1012382).
- dlm: Do not swamp the CPU with callbacks queued during recovery (bnc#1012382).
- dmaengine: imx-dma: fix wrong callback invoke (bnc#1012382).
- dm crypt: add cryptographic data integrity protection (authenticated encryption) (Git-fixes).
- dm crypt: factor IV constructor out to separate function (Git-fixes).
- dm crypt: fix crash by adding missing check for auth key size (git-fixes).
- dm crypt: fix error return code in crypt_ctr() (git-fixes).
- dm crypt: fix memory leak in crypt_ctr_cipher_old() (git-fixes).
- dm crypt: introduce new format of cipher with 'capi:' prefix (Git-fixes).
- dm crypt: wipe kernel key copy after IV initialization (Git-fixes).
- dm: do not allow readahead to limit IO size (git fixes (readahead)).
- dm kcopyd: Fix bug causing workqueue stalls (bnc#1012382).
- dm snapshot: Fix excessive memory usage and workqueue stalls (bnc#1012382).
- dm thin: fix bug where bio that overwrites thin block ignores FUA (bnc#1012382).
- Documentation/network: reword kernel version reference (bnc#1012382).
- drbd: Avoid Clang warning about pointless switch statment (bnc#1012382).
- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bnc#1012382).
- drbd: narrow rcu_read_lock in drbd_sync_handshake (bnc#1012382).
- drbd: skip spurious timeout (ping-timeo) when failing promote (bnc#1012382).
- drivers: core: Remove glue dirs from sysfs earlier (bnc#1012382).
- Drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389).
- drm/bufs: Fix Spectre v1 vulnerability (bnc#1012382).
- drm: Fix error handling in drm_legacy_addctx (bsc#1106929)
- drm/i915: Block fbdev HPD processing during suspend (bsc#1106929)
- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1106929)
- drm/modes: Prevent division by zero htotal (bnc#1012382).
- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1106929)
- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1106929)
- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1106929)
- drm/vmwgfx: Do not double-free the mode stored in par->set_mode (bsc#1103429)
- drm/vmwgfx: Fix setting of dma masks (bsc#1106929)
- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1106929)
- e1000e: allow non-monotonic SYSTIM readings (bnc#1012382).
- EDAC: Raise the maximum number of memory controllers (bsc#1120722).
- efi/libstub/arm64: Use hidden attribute for struct screen_info reference (bsc#1122650).
- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).
- enic: do not overwrite error code (bnc#1012382).
- enic: fix checksum validation for IPv6 (bnc#1012382).
- exec: load_script: do not blindly truncate shebang string (bnc#1012382).
- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bnc#1012382).
- ext4: Fix crash during online resizing (bsc#1122779).
- f2fs: Add sanity_check_inode() function (bnc#1012382).
- f2fs: avoid unneeded loop in build_sit_entries (bnc#1012382).
- f2fs: check blkaddr more accuratly before issue a bio (bnc#1012382).
- f2fs: clean up argument of recover_data (bnc#1012382).
- f2fs: clean up with is_valid_blkaddr() (bnc#1012382).
- f2fs: detect wrong layout (bnc#1012382).
- f2fs: enhance sanity_check_raw_super() to avoid potential overflow (bnc#1012382).
- f2fs: factor out fsync inode entry operations (bnc#1012382).
- f2fs: fix inode cache leak (bnc#1012382).
- f2fs: fix invalid memory access (bnc#1012382).
- f2fs: fix missing up_read (bnc#1012382).
- f2fs: fix to avoid reading out encrypted data in page cache (bnc#1012382).
- f2fs: fix to convert inline directory correctly (bnc#1012382).
- f2fs: fix to determine start_cp_addr by sbi->cur_cp_pack (bnc#1012382).
- f2fs: fix to do sanity check with block address in main area (bnc#1012382).
- f2fs: fix to do sanity check with block address in main area v2 (bnc#1012382).
- f2fs: fix to do sanity check with cp_pack_start_sum (bnc#1012382).
- f2fs: fix to do sanity check with node footer and iblocks (bnc#1012382).
- f2fs: fix to do sanity check with reserved blkaddr of inline inode (bnc#1012382).
- f2fs: fix to do sanity check with secs_per_zone (bnc#1012382).
- f2fs: fix to do sanity check with user_block_count (bnc#1012382).
- f2fs: fix validation of the block count in sanity_check_raw_super (bnc#1012382).
- f2fs: fix wrong return value of f2fs_acl_create (bnc#1012382).
- f2fs: free meta pages if sanity check for ckpt is failed (bnc#1012382).
- f2fs: give -EINVAL for norecovery and rw mount (bnc#1012382).
- f2fs: introduce and spread verify_blkaddr (bnc#1012382).
- f2fs: introduce get_checkpoint_version for cleanup (bnc#1012382).
- f2fs: move dir data flush to write checkpoint process (bnc#1012382).
- f2fs: move sanity checking of cp into get_valid_checkpoint (bnc#1012382).
- f2fs: not allow to write illegal blkaddr (bnc#1012382).
- f2fs: put directory inodes before checkpoint in roll-forward recovery (bnc#1012382).
- f2fs: read page index before freeing (bnc#1012382).
- f2fs: remove an obsolete variable (bnc#1012382).
- f2fs: return error during fill_super (bnc#1012382).
- f2fs: sanity check on sit entry (bnc#1012382).
- f2fs: use crc and cp version to determine roll-forward recovery (bnc#1012382).
- fbdev: chipsfb: remove set but not used variable 'size' (bsc#1106929)
- Fix incorrect value for X86_FEATURE_TSX_FORCE_ABORT
- Fix problem with sharetransport= and NFSv4 (bsc#1114893).
- fs: add the fsnotify call to vfs_iter_write (bnc#1012382).
- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (bnc#1012382).
- fs: do not scan the inode cache before SB_BORN is set (bnc#1012382).
- fs/epoll: drop ovflist branch prediction (bnc#1012382).
- fs: fix lost error code in dio_complete (bsc#1117744).
- fuse: call pipe_buf_release() under pipe lock (bnc#1012382).
- fuse: decrement NR_WRITEBACK_TEMP on the right page (bnc#1012382).
- fuse: handle zero sized retrieve correctly (bnc#1012382).
- futex: Fix (possible) missed wakeup (bsc#1050549).
- gdrom: fix a memory leak bug (bnc#1012382).
- gfs2: Revert 'Fix loop in gfs2_rbm_find' (bnc#1012382).
- gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB (Git-fixes).
- gpio: pl061: handle failed allocations (bnc#1012382).
- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1106929)
- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1106929)
- HID: debug: fix the ring buffer implementation (bnc#1012382).
- HID: lenovo: Add checks to fix of_led_classdev_register (bnc#1012382).
- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bnc#1012382).
- hwmon: (lm80) fix a missing check of the status of SMBus read (bnc#1012382).
- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (git-fixes).
- i2c-axxia: check for error conditions first (bnc#1012382).
- i2c: dev: prevent adapter retries and timeout being set as minus value (bnc#1012382).
- IB/core: type promotion bug in rdma_rw_init_one_mr() ().
- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).
- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).
- ibmvnic: Increase maximum queue size limit (bsc#1121726).
- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).
- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).
- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- IB/rxe: Fix incorrect cache cleanup in error flow ().
- IB/rxe: replace kvfree with vfree ().
- igb: Fix an issue that PME is not enabled during runtime suspend (bnc#1012382).
- inet: frags: add a pointer to struct netns_frags (bnc#1012382).
- inet: frags: better deal with smp races (bnc#1012382).
- inet: frags: break the 2GB limit for frags storage (bnc#1012382).
- inet: frags: change inet_frags_init_net() return value (bnc#1012382).
- inet: frags: do not clone skb in ip_expire() (bnc#1012382).
- inet: frags: fix ip6frag_low_thresh boundary (bnc#1012382).
- inet: frags: get rid of ipfrag_skb_cb/FRAG_CB (bnc#1012382).
- inet: frags: get rif of inet_frag_evicting() (bnc#1012382).
- inet: frags: refactor ipfrag_init() (bnc#1012382).
- inet: frags: refactor ipv6_frag_init() (bnc#1012382).
- inet: frags: refactor lowpan_net_frag_init() (bnc#1012382).
- inet: frags: remove inet_frag_maybe_warn_overflow() (bnc#1012382).
- inet: frags: remove some helpers (bnc#1012382).
- inet: frags: reorganize struct netns_frags (bnc#1012382).
- inet: frags: use rhashtables for reassembly units (bnc#1012382).
- input: bma150 - register input device after setting private data (bnc#1012382).
- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bnc#1012382).
- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bnc#1012382).
- input: mms114 - fix license module information (bsc#1087092).
- input: xpad - add support for SteelSeries Stratus Duo (bnc#1012382).
- intel_pstate: Update frequencies of policy->cpus only from ->set_policy() (bsc#1120017).
- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).
- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).
- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).
- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bnc#1012382).
- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129237).
- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129238).
- iommu/vt-d: Check identity map for hot-added devices (bsc#1129239).
- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).
- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129240).
- ip: add helpers to process in-order fragments faster (bnc#1012382).
- ipfrag: really prevent allocation on netns exit (bnc#1012382).
- ip: frags: fix crash in ip_do_fragment() (bnc#1012382).
- ipmi:ssif: Fix handling of multi-part return messages (bnc#1012382).
- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (bnc#1012382).
- ip: process in-order fragments efficiently (bnc#1012382).
- ip: use rb trees for IP frag queue (bnc#1012382).
- ipv4: frags: precedence bug in ip_expire() (bnc#1012382).
- ipv6: Consider sk_bound_dev_if when binding a socket to an address (bnc#1012382).
- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (bnc#1012382).
- ipv6: fix kernel-infoleak in ipv6_local_error() (bnc#1012382).
- ipv6: frags: rewrite ip6_expire_frag_queue() (bnc#1012382).
- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (bnc#1012382).
- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bnc#1012382).
- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bnc#1012382).
- ixgbe: fix crash in build_skb Rx code path (git-fixes).
- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bnc#1012382).
- kABI: protect linux/kfifo.h include in hid-debug (kabi).
- kABI: protect struct hda_bus (kabi).
- kABI: protect struct inet_peer (kabi).
- kabi: reorder new slabinfo fields in struct kmem_cache_node (bnc#1116653).
- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).
- kaweth: use skb_cow_head() to deal with cloned skbs (bnc#1012382).
- kconfig: fix file name and line number of warn_ignored_character() (bnc#1012382).
- kconfig: fix memory leak when EOF is encountered in quotation (bnc#1012382).
- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (bnc#1012382).
- kernel/hung_task.c: break RCU locks based on jiffies (bnc#1012382).
- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).
- kvm: arm/arm64: vgic-its: Check CBASER/BASER validity before enabling the ITS (bsc#1109248).
- kvm: arm/arm64: vgic-its: Check GITS_BASER Valid bit before saving tables (bsc#1109248).
- kvm: arm/arm64: vgic-its: Fix return value for device table restore (bsc#1109248).
- kvm: arm/arm64: vgic-its: Fix vgic_its_restore_collection_table returned value (bsc#1109248).
- kvm: nVMX: Do not halt vcpu when L1 is injecting events to L2 (bsc#1129413).
- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129414).
- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129415).
- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129416).
- kvm: VMX: Do not allow reexecute_instruction() when skipping MMIO instr (bsc#1129417).
- kvm: VMX: Fix x2apic check in vmx_msr_bitmap_mode() (bsc#1124166).
- kvm: VMX: Missing part of upstream commit 904e14fb7cb9 (bsc#1124166).
- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129418).
- kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082).
- kvm: x86: Fix single-step debugging (bnc#1012382).
- kvm: x86: IA32_ARCH_CAPABILITIES is always supported (bsc#1129419).
- kvm: x86: svm: report MSR_IA32_MCG_EXT_CTL as unsupported (bnc#1012382).
- l2tp: copy 4 more bytes to linear part if necessary (bnc#1012382).
- l2tp: fix reading optional fields of L2TPv3 (bnc#1012382).
- l2tp: remove l2specific_len dependency in l2tp_core (bnc#1012382).
- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125810).
- libceph: handle an empty authorize reply (bsc#1126772).
- libnvdimm: fix ars_status output length calculation (bsc#1124777).
- libnvdimm, pfn: Pad pfn namespaces relative to other regions (bsc#1124811).
- libnvdimm: Use max contiguous area for namespace size (bsc#1124780).
- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).
- loop: Fix double mutex_unlock(&loop_ctl_mutex) in loop_control_ioctl() (bnc#1012382).
- loop: Fold __loop_release into loop_release (bnc#1012382).
- loop: Get rid of loop_index_mutex (bnc#1012382).
- LSM: Check for NULL cred-security on free (bnc#1012382).
- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bnc#1012382).
- mac80211: fix radiotap vendor presence bitmap handling (bnc#1012382).
- md: batch flush requests (bsc#1119680).
- mdio_bus: Fix use-after-free on device_register fails (git-fixes).
- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bnc#1012382).
- media: em28xx: Fix misplaced reset of dev->v4l::field_count (bnc#1012382).
- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bnc#1012382).
- media: vb2: be sure to unlock mutex on errors (bnc#1012382).
- media: vb2: vb2_mmap: move lock up (bnc#1012382).
- media: vivid: fix error handling of kthread_run (bnc#1012382).
- media: vivid: set min width/height to a value > 0 (bnc#1012382).
- memstick: Prevent memstick host from getting runtime suspended during card detection (bnc#1012382).
- mfd: as3722: Handle interrupts on suspend (bnc#1012382).
- mfd: as3722: Mark PM functions as __maybe_unused (bnc#1012382).
- mfd: tps6586x: Handle interrupts on suspend (bnc#1012382).
- misc: vexpress: Off by one in vexpress_syscfg_exec() (bnc#1012382).
- mISDN: fix a race in dev_expire_timer() (bnc#1012382).
- mlxsw: pci: Correctly determine if descriptor queue is full (git-fixes).
- mlxsw: reg: Use correct offset in field definiton (git-fixes).
- mmc: atmel-mci: do not assume idle after atmci_request_end (bnc#1012382).
- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).
- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bnc#1012382).
- mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL (bnc#1012382).
- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).
- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (bnc#1012382).
- mm: only report isolation failures when offlining memory (generic hotplug debugability).
- mm, oom: fix use-after-free in oom_kill_process (bnc#1012382).
- mm, page_alloc: drop should_suppress_show_mem (bnc#1125892, bnc#1106061).
- mm/page-writeback.c: do not break integrity writeback on ->writepage() error (bnc#1012382).
- mm, proc: be more verbose about unstable VMA flags in /proc/<pid>/smaps (bnc#1012382).
- mm, slab: faster active and free stats (bsc#116653, VM Performance).
- mm/slab: improve performance of gathering slabinfo stats (bsc#116653, VM Performance).
- mm, slab: maintain total slab count instead of active count (bsc#116653, VM Performance).
- modpost: validate symbol names also in find_elf_symbol (bnc#1012382).
- mtd: rawnand: gpmi: fix MX28 bus master lockup problem (bnc#1012382).
- net: Add header for usage of fls64() (bnc#1012382).
- net: bridge: fix a bug on using a neighbour cache entry without checking its state (bnc#1012382).
- net: bridge: Fix ethernet header pointer before check skb forwardable (bnc#1012382).
- net: call sk_dst_reset when set SO_DONTROUTE (bnc#1012382).
- net: Do not allocate page fragments that are not skb aligned (bnc#1012382).
- net: dp83640: expire old TX-skb (bnc#1012382).
- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).
- net: dsa: mv88e6xxx: fix port VLAN maps (git-fixes).
- net: dsa: slave: Do not propagate flag changes on down slave interfaces (bnc#1012382).
- net: Fix for_each_netdev_feature on Big endian (bnc#1012382).
- net: fix IPv6 prefix route residue (bnc#1012382).
- net: fix pskb_trim_rcsum_slow() with odd trim offset (bnc#1012382).
- net: Fix usage of pskb_trim_rcsum (bnc#1012382).
- net/hamradio/6pack: Convert timers to use timer_setup() (git-fixes).
- net/hamradio/6pack: use mod_timer() to rearm timers (git-fixes).
- net: ieee802154: 6lowpan: fix frag reassembly (bnc#1012382).
- net: ipv4: do not handle duplicate fragments as overlapping (bnc#1012382 bsc#1116345).
- net: ipv4: Fix memory leak in network namespace dismantle (bnc#1012382).
- net: ipv4: use a dedicated counter for icmp_v4 redirect packets (bnc#1012382).
- net: lan78xx: Fix race in tx pending skb size calculation (git-fixes).
- net/mlx4_core: Add masking for a few queries on HCA caps (bnc#1012382).
- net/mlx4_core: drop useless LIST_HEAD (git-fixes).
- net/mlx4_core: Fix qp mtt size calculation (git-fixes).
- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).
- net/mlx4: Fix endianness issue in qp context params (git-fixes).
- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).
- net/mlx5e: Fix TCP checksum in LRO buffers (git-fixes).
- net/mlx5: Fix driver load bad flow when having fw initializing timeout (git-fixes).
- net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes).
- net/mlx5: Fix use-after-free in self-healing flow (git-fixes).
- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).
- net: modify skb_rbtree_purge to return the truesize of all purged skbs (bnc#1012382).
- net: mv643xx_eth: fix packet corruption with TSO and tiny unaligned packets (git-fixes).
- net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS (git-fixes).
- net: phy: bcm7xxx: Fix shadow mode 2 disabling (git-fixes).
- net: pskb_trim_rcsum() and CHECKSUM_COMPLETE are friends (bnc#1012382).
- net: qca_spi: Fix race condition in spi transfers (git-fixes).
- netrom: switch to sock timer API (bnc#1012382).
- net/rose: fix NULL ax25_cb kernel panic (bnc#1012382).
- net_sched: refetch skb protocol for each filter (bnc#1012382).
- net: speed up skb_rbtree_purge() (bnc#1012382).
- net: stmmac: Fix a race in EEE enable callback (bnc#1012382).
- net: stmmac: Fix a race in EEE enable callback (git-fixes).
- net: systemport: Fix WoL with password after deep sleep (bnc#1012382).
- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (git-fixes).
- net/x25: do not hold the cpu too long in x25_new_lci() (bnc#1012382).
- NFC: nxp-nci: Include unaligned.h instead of access_ok.h (bnc#1012382).
- nfit: fix unchecked dereference in acpi_nfit_ctl (bsc#1125014).
- nfsd4: fix crash on writing v4_end_grace before nfsd startup (bnc#1012382).
- NFS: nfs_compare_mount_options always compare auth flavors (bnc#1012382).
- niu: fix missing checks of niu_pci_eeprom_read (bnc#1012382).
- ocfs2: do not clear bh uptodate for block read (bnc#1012382).
- ocfs2: fix panic due to unrecovered local alloc (bnc#1012382).
- omap2fb: Fix stack memory disclosure (bsc#1106929)
- openvswitch: Avoid OOB read when parsing flow nlattrs (bnc#1012382).
- packet: Do not leak dev refcounts on error exit (bnc#1012382).
- pci: altera: Check link status before retrain link (bnc#1012382).
- pci: altera: Fix altera_pcie_link_is_up() (bnc#1012382).
- pci: altera: Move retrain from fixup to altera_pcie_host_init() (bnc#1012382).
- pci: altera: Poll for link training status after retraining the link (bnc#1012382).
- pci: altera: Poll for link up status after retraining the link (bnc#1012382).
- pci: altera: Reorder read/write functions (bnc#1012382).
- pci: altera: Rework config accessors for use without a struct pci_bus (bnc#1012382).
- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1129241).
- perf/core: Do not WARN() for impossible ring-buffer sizes (bnc#1012382).
- perf/core: Fix impossible ring-buffer sizes warning (bnc#1012382).
- perf intel-pt: Fix error with config term 'pt=0' (bnc#1012382).
- perf parse-events: Fix unchecked usage of strncpy() (bnc#1012382).
- perf svghelper: Fix unchecked usage of strncpy() (bnc#1012382).
- perf tests evsel-tp-sched: Fix bitwise operator (bnc#1012382).
- perf tools: Add Hygon Dhyana support (bnc#1012382).
- perf unwind: Take pgoff into account when reporting elf to libdwfl (bnc#1012382).
- perf unwind: Unwind with libdw does not take symfs into account (bnc#1012382).
- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).
- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).
- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).
- perf/x86/intel: Fix memory corruption (bsc#1121805).
- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).
- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).
- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).
- perf/x86/intel/uncore: Add Node ID mask (bnc#1012382).
- phy: micrel: Ensure interrupts are reenabled on resume (git-fixes).
- pinctrl: msm: fix gpio-hog related boot issues (bnc#1012382).
- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bnc#1012382).
- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bnc#1012382).
- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bnc#1012382).
- platform/x86: thinkpad_acpi: Proper model/release matching (bsc#1099810).
- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).
- powerpc: Detect the presence of big-cores via 'ibm, thread-groups' (bsc#1109695).
- powerpc, hotplug: Avoid to touch non-existent cpumasks (bsc#1109695).
- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).
- powerpc/pseries: Add CPU dlpar remove functionality (bsc#1128756).
- powerpc/pseries: add of_node_put() in dlpar_detach_node() (bnc#1012382).
- powerpc/pseries: Consolidate CPU hotplug code to hotplug-cpu.c (bsc#1128756).
- powerpc/pseries/cpuidle: Fix preempt warning (bnc#1012382).
- powerpc/pseries: Factor out common cpu hotplug code (bsc#1128756).
- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1128756).
- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).
- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).
- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).
- powerpc/smp: Rework CPU topology construction (bsc#1109695).
- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).
- powerpc/uaccess: fix warning/error with access_ok() (bnc#1012382).
- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).
- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).
- pppoe: fix reception of frames with no mac header (git-fixes).
- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).
- proc: Remove empty line in /proc/self/status (bnc#1012382 bsc#1094823).
- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).
- pstore/ram: Do not treat empty buffers as valid (bnc#1012382).
- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bnc#1012382).
- r8169: Add support for new Realtek Ethernet (bnc#1012382).
- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125808).
- rcu: Force boolean subscript for expedited stall warnings (bnc#1012382).
- RDMA/bnxt_re: Fix a couple off by one bugs (bsc#1020413, ).
- RDMA/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446).
- Revert 'bs-upload-kernel: do not set %opensuse_bs' This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.
- Revert 'cifs: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs)' (bnc#1012382).
- Revert 'exec: load_script: do not blindly truncate shebang string' (bnc#1012382).
- Revert 'Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G' (bnc#1012382).
- Revert 'loop: Fix double mutex_unlock(&loop_ctl_mutex) in loop_control_ioctl()' (bnc#1012382).
- Revert 'loop: Fold __loop_release into loop_release' (bnc#1012382).
- Revert 'loop: Get rid of loop_index_mutex' (bnc#1012382).
- Revert 'mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).' The backport patch does not built properly.
- Revert 'mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL' (bnc#1012382).
- Revert 'net: stmmac: Fix a race in EEE enable callback (git-fixes).' This reverts commit f323fa8d233c1f44aff17e6fae90c2c8be30edf9. The patch was already included in stable 4.4.176.
- Revert 'sd: disable logical block provisioning if 'lbpme' is not set' This reverts commit 96370bd87299c7a6883b3e2bf13818f60c8ba611. Patch not accepted upstream.
- Revert 'x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls' (bsc#1128565).
- rhashtable: Add rhashtable_lookup() (bnc#1012382).
- rhashtable: add rhashtable_lookup_get_insert_key() (bnc#1012382 bsc#1042286).
- rhashtable: add schedule points (bnc#1012382).
- rhashtable: reorganize struct rhashtable layout (bnc#1012382).
- s390/early: improve machine detection (bnc#1012382).
- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).
- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (bnc#1012382).
- s390/smp: fix CPU hotplug deadlock with CPU rescan (bnc#1012382).
- sata_rcar: fix deferred probing (bnc#1012382).
- sched/wake_q: Document wake_q_add() (bsc#1050549).
- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).
- sched/wake_q: Reduce reference counting for special users (bsc#1050549).
- scripts/decode_stacktrace: only strip base path when a prefix of the path (bnc#1012382).
- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes
- scsi: aacraid: Fix missing break in switch statement (bsc#1128696).
- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).
- scsi: lpfc: Correct LCB RJT handling (bnc#1012382).
- scsi: lpfc: Correct MDS diag and nvmet configuration (bsc#1125796).
- scsi: lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1127725).
- scsi: megaraid: fix out-of-bound array accesses (bnc#1012382).
- scsi: mpt3sas: Add an I/O barrier (bsc#1117108).
- scsi: mpt3sas: Added support for nvme encapsulated request message (bsc#1117108).
- scsi: mpt3sas: Added support for SAS Device Discovery Error Event (bsc#1117108).
- scsi: mpt3sas: Adding support for SAS3616 HBA device (bsc#1117108).
- scsi: mpt3sas: Add ioc_<level> logging macros (bsc#1117108).
- scsi: mpt3sas: Add nvme device support in slave alloc, target alloc and probe (bsc#1117108).
- scsi: mpt3sas: Add PCI device ID for Andromeda (bsc#1117108).
- scsi: mpt3sas: Add-Task-management-debug-info-for-NVMe-drives (bsc#1117108).
- scsi: mpt3sas: Allow processing of events during driver unload (bsc#1117108).
- scsi: mpt3sas: always use first reserved smid for ioctl passthrough (bsc#1117108).
- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).
- scsi: mpt3sas: API's to remove nvme drive from sml (bsc#1117108).
- scsi: mpt3sas: API 's to support NVMe drive addition to SML (bsc#1117108).
- scsi: mpt3sas: As per MPI-spec, use combined reply queue for SAS3.5 controllers when HBA supports more than 16 MSI-x vectors (bsc#1117108).
- scsi: mpt3sas: Bug fix for big endian systems (bsc#1117108).
- scsi: mpt3sas: Bump mpt3sas driver version to v16.100.00.00 (bsc#1117108).
- scsi: mpt3sas: Cache enclosure pages during enclosure add (bsc#1117108).
- scsi: mpt3sas: check command status before attempting abort (bsc#1117108).
- scsi: mpt3sas: clarify mmio pointer types (bsc#1117108).
- scsi: mpt3sas: cleanup _scsih_pcie_enumeration_event() (bsc#1117108).
- scsi: mpt3sas: Configure reply post queue depth, DMA and sgl tablesize (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).
- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).
- scsi: mpt3sas: Convert mlsleading uses of pr_<level> with MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Convert uses of pr_<level> with MPT3SAS_FMT to ioc_<level> (bsc#1117108).
- scsi: mpt3sas: Display chassis slot information of the drive (bsc#1117108).
- scsi: mpt3sas: Do not abort I/Os issued to NVMe drives while processing Async Broadcast primitive event (bsc#1117108).
- scsi: mpt3sas: Do not access the structure after decrementing it's instance reference count (bsc#1117108).
- scsi: mpt3sas: Do not use 32-bit atomic request descriptor for Ventura controllers (bsc#1117108).
- scsi: mpt3sas: Enhanced handling of Sense Buffer (bsc#1117108).
- scsi: mpt3sas: fix an out of bound write (bsc#1117108).
- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Fix calltrace observed while running IO & reset (bsc#1117108).
- scsi: mpt3sas: fix dma_addr_t casts (bsc#1117108).
- scsi: mpt3sas: Fixed memory leaks in driver (bsc#1117108).
- scsi: mpt3sas: Fix, False timeout prints for ioctl and other internal commands during controller reset (bsc#1117108).
- scsi: mpt3sas: fix format overflow warning (bsc#1117108).
- scsi: mpt3sas: Fix indentation (bsc#1117108).
- scsi: mpt3sas: Fix memory allocation failure test in 'mpt3sas_base_attach()' (bsc#1117108).
- scsi: mpt3sas: Fix nvme drives checking for tlr (bsc#1117108).
- scsi: mpt3sas: fix oops in error handlers after shutdown/unload (bsc#1117108).
- scsi: mpt3sas: Fix possibility of using invalid Enclosure Handle for SAS device after host reset (bsc#1117108).
- scsi: mpt3sas: fix possible memory leak (bsc#1117108).
- scsi: mpt3sas: fix pr_info message continuation (bsc#1117108).
- scsi: mpt3sas: Fix removal and addition of vSES device during host reset (bsc#1117108).
- scsi: mpt3sas: Fix sparse warnings (bsc#1117108).
- scsi: mpt3sas: fix spelling mistake: 'disbale' -> 'disable' (bsc#1117108).
- scsi: mpt3sas: For NVME device, issue a protocol level reset (bsc#1117108).
- scsi: mpt3sas: Handle NVMe PCIe device related events generated from firmware (bsc#1117108).
- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).
- scsi: mpt3sas: Incorrect command status was set/marked as not used (bsc#1117108).
- scsi: mpt3sas: Increase event log buffer to support 24 port HBA's (bsc#1117108).
- scsi: mpt3sas: Introduce API to get BAR0 mapped buffer address (bsc#1117108).
- scsi: mpt3sas: Introduce Base function for cloning (bsc#1117108).
- scsi: mpt3sas: Introduce function to clone mpi reply (bsc#1117108).
- scsi: mpt3sas: Introduce function to clone mpi request (bsc#1117108).
- scsi: mpt3sas: Introduce mpt3sas_get_st_from_smid() (bsc#1117108).
- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).
- scsi: mpt3sas: Lockless access for chain buffers (bsc#1117108).
- scsi: mpt3sas: lockless command submission (bsc#1117108).
- scsi: mpt3sas: make function _get_st_from_smid static (bsc#1117108).
- scsi: mpt3sas: NVMe drive support for BTDHMAPPING ioctl command and log info (bsc#1117108).
- scsi: mpt3sas: open-code _scsih_scsi_lookup_get() (bsc#1117108).
- scsi: mpt3sas: Optimize I/O memory consumption in driver (bsc#1117108).
- scsi: mpt3sas: Pre-allocate RDPQ Array at driver boot time (bsc#1117108).
- scsi: mpt3sas: Processing of Cable Exception events (bsc#1117108).
- scsi: mpt3sas: Reduce memory footprint in kdump kernel (bsc#1117108).
- scsi: mpt3sas: remove a stray KERN_INFO (bsc#1117108).
- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).
- scsi: mpt3sas: remove redundant copy_from_user in _ctl_getiocinfo (bsc#1117108).
- scsi: mpt3sas: remove redundant wmb (bsc#1117108).
- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).
- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).
- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).
- scsi: mpt3sas: Remove unused variable requeue_event (bsc#1117108).
- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).
- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).
- scsi: mpt3sas: Report Firmware Package Version from HBA Driver (bsc#1117108).
- scsi: mpt3sas: scan and add nvme device after controller reset (bsc#1117108).
- scsi: mpt3sas: separate out _base_recovery_check() (bsc#1117108).
- scsi: mpt3sas: set default value for cb_idx (bsc#1117108).
- scsi: mpt3sas: Set NVMe device queue depth as 128 (bsc#1117108).
- scsi: mpt3sas: SGL to PRP Translation for I/Os to NVMe devices (bsc#1117108).
- scsi: mpt3sas: simplify mpt3sas_scsi_issue_tm() (bsc#1117108).
- scsi: mpt3sas: simplify task management functions (bsc#1117108).
- scsi: mpt3sas: simplify _wait_for_commands_to_complete() (bsc#1117108).
- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).
- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).
- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).
- scsi: mpt3sas: switch to pci_alloc_irq_vectors (bsc#1117108).
- scsi: mpt3sas: Updated MPI headers to v2.00.48 (bsc#1117108).
- scsi: mpt3sas: Update driver version '25.100.00.00' (bsc#1117108).
- scsi: mpt3sas: Update driver version '26.100.00.00' (bsc#1117108).
- scsi: mpt3sas: Update MPI Headers (bsc#1117108).
- scsi: mpt3sas: Update mpt3sas driver version (bsc#1117108).
- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).
- scsi: mpt3sas: use list_splice_init() (bsc#1117108).
- scsi: mpt3sas: wait for and flush running commands on shutdown/unload (bsc#1117108).
- scsi: qla2xxx: Fix deadlock between ATIO and HW lock (bsc#1125794).
- scsi: qla2xxx: Fix early srb free on abort (bsc#1121713).
- scsi: qla2xxx: Fix for double free of SRB structure (bsc#1121713).
- scsi: qla2xxx: Increase abort timeout value (bsc#1121713).
- scsi: qla2xxx: Move {get|rel}_sp to base_qpair struct (bsc#1121713).
- scsi: qla2xxx: Return switch command on a timeout (bsc#1121713).
- scsi: qla2xxx: Turn off IOCB timeout timer on IOCB completion (bsc#1121713).
- scsi: qla2xxx: Use correct qpair for ABTS/CMD (bsc#1121713).
- scsi: sd: Fix cache_type_store() (bnc#1012382).
- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).
- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).
- scsi: target: use consistent left-aligned ASCII INQUIRY data (bnc#1012382).
- sctp: allocate sctp_sockaddr_entry with kzalloc (bnc#1012382).
- sd: disable logical block provisioning if 'lbpme' is not set (bsc#1086095 bsc#1078355).
- selinux: fix GPF on invalid policy (bnc#1012382).
- seq_buf: Make seq_buf_puts() null-terminate the buffer (bnc#1012382).
- serial: fsl_lpuart: clear parity enable bit when disable parity (bnc#1012382).
- series.conf: Move 'patches.fixes/aio-hold-an-extra-file-reference-over-AIO-read-write.patch' into sorted section.
- signal: Always notice exiting tasks (bnc#1012382).
- signal: Better detection of synchronous signals (bnc#1012382).
- signal: Restore the stop PTRACE_EVENT_EXIT (bnc#1012382).
- skge: potential memory corruption in skge_get_regs() (bnc#1012382).
- sky2: Increase D3 delay again (bnc#1012382).
- slab: alien caches must not be initialized if the allocation of the alien cache failed (bnc#1012382).
- smack: fix access permissions for keyring (bnc#1012382).
- smsc95xx: Use skb_cow_head to deal with cloned skbs (bnc#1012382).
- soc/tegra: Do not leak device tree node reference (bnc#1012382).
- staging:iio:ad2s90: Make probe handle spi_setup failure (bnc#1012382).
- staging: iio: ad7780: update voltage on read (bnc#1012382).
- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bnc#1012382).
- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bnc#1012382).
- sunrpc: handle ENOMEM in rpcb_getport_async (bnc#1012382).
- sunvdc: Do not spin in an infinite loop when vio_ldc_send() returns EAGAIN (bnc#1012382).
- sysfs: Disable lockdep for driver bind/unbind files (bnc#1012382).
- tcp: clear icsk_backoff in tcp_write_queue_purge() (bnc#1012382).
- tcp: tcp_v4_err() should be more careful (bnc#1012382).
- team: avoid complex list operations in team_nl_cmd_options_set() (bnc#1012382).
- team: Free BPF filter when unregistering netdev (git-fixes).
- test_hexdump: use memcpy instead of strncpy (bnc#1012382).
- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bnc#1012382).
- timekeeping: Use proper seqcount initializer (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_doit (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_link_set (bnc#1012382).
- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bnc#1012382).
- tipc: use destination length for copy string (bnc#1012382).
- tracing: Do not free iter->trace in fail path of tracing_open_pipe() (bsc#1129581).
- tracing/uprobes: Fix output for multiple string arguments (bnc#1012382).
- tty: Do not block on IO when ldisc change is pending (bnc#1105428).
- tty: Do not hold ldisc lock in tty_reopen() if ldisc present (bnc#1105428).
- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).
- tty: Handle problem if line discipline does not have receive_buf (bnc#1012382).
- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).
- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).
- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).
- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).
- tty/ldsem: Wake up readers after timed out down_write() (bnc#1012382).
- tty/n_hdlc: fix __might_sleep warning (bnc#1012382).
- tty: serial: samsung: Properly set flags in autoCTS mode (bnc#1012382).
- tty: Simplify tty->count math in tty_reopen() (bnc#1105428).
- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (bnc#1012382).
- uapi/if_ether.h: prevent redefinition of struct ethhdr (bnc#1012382).
- ucc_geth: Reset BQL queue when stopping device (bnc#1012382).
- udf: Fix BUG on corrupted inode (bnc#1012382).
- um: Avoid marking pages with 'changed protection' (bnc#1012382).
- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bnc#1012382).
- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bnc#1012382).
- usb: dwc2: Remove unnecessary kfree (bnc#1012382).
- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bnc#1012382).
- usb: hub: delay hub autosuspend if USB3 port is still link training (bnc#1012382).
- usb: phy: am335x: fix race condition in _probe (bnc#1012382).
- usb: serial: pl2303: add new PID to support PL2303TB (bnc#1012382).
- usb: serial: simple: add Motorola Tetra TPG2200 device id (bnc#1012382).
- usb: storage: add quirk for SMI SM3350 (bnc#1012382).
- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bnc#1012382).
- video: clps711x-fb: release disp device node in probe() (bnc#1012382).
- vsock: cope with memory allocation failure at socket creation time (bnc#1012382).
- vt: invoke notifier on screen size change (bnc#1012382).
- vxlan: test dev->flags & IFF_UP before calling netif_rx() (bnc#1012382).
- wireless: airo: potential buffer overflow in sprintf() (bsc#1120902).
- writeback: do not decrement wb->refcnt if !wb->bdi (git fixes (writeback)).
- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).
- x86/a.out: Clear the dump structure initially (bnc#1012382).
- x86/fpu: Add might_fault() to user_insn() (bnc#1012382).
- x86/kaslr: Fix incorrect i8254 outb() parameters (bnc#1012382).
- x86: livepatch: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).
- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bnc#1012382).
- x86/PCI: Fix Broadcom CNB20LE unintended sign extension (redux) (bnc#1012382).
- x86/pkeys: Properly copy pkey state at fork() (bsc#1106105).
- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bnc#1012382).
- x86: respect memory size limiting via mem= parameter (bsc#1117645).
- x86/xen: dont add memory above max allowed allocation (bsc#1117645).
- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).
- xen: remove pre-xen3 fallback handlers (bsc#1065600).
- xfrm6_tunnel: Fix spi check in __xfrm6_tunnel_alloc_spi (bnc#1012382).
- xfrm: refine validation of template and selector families (bnc#1012382).
- Yama: Check for pid death before checking ancestry (bnc#1012382).
- xfs: remove filestream item xfs_inode reference (bsc#1127961).
Patchnames
SUSE-2019-901,SUSE-SLE-SERVER-12-SP3-2019-901
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.176 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free. (bnc#1124728)\n- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).\n- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host\u0027s stack memory contents to a guest (bsc#1124735).\n- CVE-2017-18249: The add_free_nid function in fs/f2fs/node.c did not properly track an allocated nid, which allowed local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads (bnc#1087036).\n\nThe following non-security bugs were fixed:\n\n- acpi/nfit: Block function zero DSMs (bsc#1123321).\n- acpi, nfit: Fix ARS overflow continuation (bsc#1125000).\n- acpi/nfit: fix cmd_rc for acpi_nfit_ctl to always return a value (bsc#1124775).\n- acpi/nfit: Fix command-supported detection (bsc#1123323).\n- acpi: power: Skip duplicate power resource references in _PRx (bnc#1012382).\n- acpi / processor: Fix the return value of acpi_processor_ids_walk() (git fixes (acpi)).\n- alpha: Fix Eiger NR_IRQS to 128 (bnc#1012382).\n- alpha: fix page fault handling for r16-r18 targets (bnc#1012382).\n- alsa: bebob: fix model-id of unit for Apogee Ensemble (bnc#1012382).\n- alsa: compress: Fix stop handling on compressed capture streams (bnc#1012382).\n- alsa: hda - Add quirk for HP EliteBook 840 G5 (bnc#1012382).\n- alsa: hda/realtek - Disable headset Mic VREF for headset mode of ALC225 (bnc#1012382).\n- alsa: hda - Serialize codec registrations (bnc#1012382).\n- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bnc#1012382).\n- ARC: perf: map generic branches to correct hardware condition (bnc#1012382).\n- arm64: Do not trap host pointer auth use to EL2 (bnc#1012382).\n- arm64: ftrace: do not adjust the LR value (bnc#1012382).\n- arm64: hyp-stub: Forbid kprobing of the hyp-stub (bnc#1012382).\n- arm64/kvm: consistently handle host HCR_EL2 flags (bnc#1012382).\n- arm64: KVM: Skip MMIO insn after emulation (bnc#1012382).\n- arm64: perf: set suppress_bind_attrs flag to true (bnc#1012382).\n- ARM: 8808/1: kexec:offline panic_smp_self_stop CPU (bnc#1012382).\n- ARM: cns3xxx: Fix writing to wrong PCI config registers after alignment (bnc#1012382).\n- ARM: dts: da850-evm: Correct the sound card name (bnc#1012382).\n- ARM: dts: Fix OMAP4430 SDP Ethernet startup (bnc#1012382).\n- ARM: dts: kirkwood: Fix polarity of GPIO fan lines (bnc#1012382).\n- ARM: dts: mmp2: fix TWSI2 (bnc#1012382).\n- ARM: iop32x/n2100: fix PCI IRQ mapping (bnc#1012382).\n- ARM: OMAP2+: hwmod: Fix some section annotations (bnc#1012382).\n- ARM: pxa: avoid section mismatch warning (bnc#1012382).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bnc#1012382).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bnc#1012382).\n- ASoC: Intel: mrfld: fix uninitialized variable access (bnc#1012382).\n- ata: Fix racy link clearance (bsc#1107866).\n- ax25: fix possible use-after-free (bnc#1012382).\n- batman-adv: Avoid WARN on net_device without parent in netns (bnc#1012382).\n- batman-adv: Force mac header to start of data on xmit (bnc#1012382).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1090435).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128893).\n- block/loop: Use global lock for ioctl() operation (bnc#1012382).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (Git-fixes).\n- bluetooth: Fix unnecessary error message for HCI request completion (bnc#1012382).\n- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).\n- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1012382).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128452).\n- btrfs: tree-checker: Check level for leaves and nodes (bnc#1012382).\n- btrfs: tree-checker: Do not check max block group size as current max chunk size limit is unreliable (fixes for bnc#1012382 bsc#1102875 bsc#1102877 bsc#1102879 bsc#1102882 bsc#1102896).\n- btrfs: tree-checker: Fix misleading group system information (bnc#1012382).\n- btrfs: tree-check: reduce stack consumption in check_dir_item (bnc#1012382).\n- btrfs: validate type when reading a chunk (bnc#1012382).\n- btrfs: wait on ordered extents on abort cleanup (bnc#1012382).\n- can: bcm: check timer values before ktime conversion (bnc#1012382).\n- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bnc#1012382).\n- can: gw: ensure DLC boundaries after CAN frame modification (bnc#1012382).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126773).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125809).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- char/mwave: fix potential Spectre v1 vulnerability (bnc#1012382).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: Always resolve hostname before reconnecting (bnc#1012382).\n- cifs: check ntwrk_buf_start for NULL before dereferencing it (bnc#1012382).\n- cifs: Do not count -ENODATA as failure for query directory (bnc#1012382).\n- cifs: Do not hide EINTR after sending network packets (bnc#1012382).\n- cifs: Fix possible hang during async MTU reads and writes (bnc#1012382).\n- cifs: Fix potential OOB access of lock element array (bnc#1012382).\n- cifs: Limit memory used by lock request calls to a page (bnc#1012382).\n- clk: imx6q: reset exclusive gates on init (bnc#1012382).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bnc#1012382).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpufreq: intel_pstate: Fix HWP on boot CPU after system resume (bsc#1120017).\n- cpuidle: big.LITTLE: fix refcount leak (bnc#1012382).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bnc#1012382).\n- crypto: authenc - fix parsing key with misaligned rta_len (bnc#1012382).\n- crypto: cts - fix crash on short inputs (bnc#1012382).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bnc#1012382).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bnc#1012382).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bnc#1012382).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bnc#1012382).\n- debugfs: fix debugfs_rename parameter checking (bnc#1012382).\n- device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1129770).\n- Disable MSI also when pcie-octeon.pcie_disable on (bnc#1012382).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bnc#1012382).\n- dmaengine: imx-dma: fix wrong callback invoke (bnc#1012382).\n- dm crypt: add cryptographic data integrity protection (authenticated encryption) (Git-fixes).\n- dm crypt: factor IV constructor out to separate function (Git-fixes).\n- dm crypt: fix crash by adding missing check for auth key size (git-fixes).\n- dm crypt: fix error return code in crypt_ctr() (git-fixes).\n- dm crypt: fix memory leak in crypt_ctr_cipher_old() (git-fixes).\n- dm crypt: introduce new format of cipher with \u0027capi:\u0027 prefix (Git-fixes).\n- dm crypt: wipe kernel key copy after IV initialization (Git-fixes).\n- dm: do not allow readahead to limit IO size (git fixes (readahead)).\n- dm kcopyd: Fix bug causing workqueue stalls (bnc#1012382).\n- dm snapshot: Fix excessive memory usage and workqueue stalls (bnc#1012382).\n- dm thin: fix bug where bio that overwrites thin block ignores FUA (bnc#1012382).\n- Documentation/network: reword kernel version reference (bnc#1012382).\n- drbd: Avoid Clang warning about pointless switch statment (bnc#1012382).\n- drbd: disconnect, if the wrong UUIDs are attached on a connected peer (bnc#1012382).\n- drbd: narrow rcu_read_lock in drbd_sync_handshake (bnc#1012382).\n- drbd: skip spurious timeout (ping-timeo) when failing promote (bnc#1012382).\n- drivers: core: Remove glue dirs from sysfs earlier (bnc#1012382).\n- Drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389).\n- drm/bufs: Fix Spectre v1 vulnerability (bnc#1012382).\n- drm: Fix error handling in drm_legacy_addctx (bsc#1106929)\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1106929)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1106929)\n- drm/modes: Prevent division by zero htotal (bnc#1012382).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1106929)\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1106929)\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1106929)\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- drm/vmwgfx: Fix setting of dma masks (bsc#1106929)\n- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1106929)\n- e1000e: allow non-monotonic SYSTIM readings (bnc#1012382).\n- EDAC: Raise the maximum number of memory controllers (bsc#1120722).\n- efi/libstub/arm64: Use hidden attribute for struct screen_info reference (bsc#1122650).\n- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).\n- enic: do not overwrite error code (bnc#1012382).\n- enic: fix checksum validation for IPv6 (bnc#1012382).\n- exec: load_script: do not blindly truncate shebang string (bnc#1012382).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bnc#1012382).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- f2fs: Add sanity_check_inode() function (bnc#1012382).\n- f2fs: avoid unneeded loop in build_sit_entries (bnc#1012382).\n- f2fs: check blkaddr more accuratly before issue a bio (bnc#1012382).\n- f2fs: clean up argument of recover_data (bnc#1012382).\n- f2fs: clean up with is_valid_blkaddr() (bnc#1012382).\n- f2fs: detect wrong layout (bnc#1012382).\n- f2fs: enhance sanity_check_raw_super() to avoid potential overflow (bnc#1012382).\n- f2fs: factor out fsync inode entry operations (bnc#1012382).\n- f2fs: fix inode cache leak (bnc#1012382).\n- f2fs: fix invalid memory access (bnc#1012382).\n- f2fs: fix missing up_read (bnc#1012382).\n- f2fs: fix to avoid reading out encrypted data in page cache (bnc#1012382).\n- f2fs: fix to convert inline directory correctly (bnc#1012382).\n- f2fs: fix to determine start_cp_addr by sbi-\u003ecur_cp_pack (bnc#1012382).\n- f2fs: fix to do sanity check with block address in main area (bnc#1012382).\n- f2fs: fix to do sanity check with block address in main area v2 (bnc#1012382).\n- f2fs: fix to do sanity check with cp_pack_start_sum (bnc#1012382).\n- f2fs: fix to do sanity check with node footer and iblocks (bnc#1012382).\n- f2fs: fix to do sanity check with reserved blkaddr of inline inode (bnc#1012382).\n- f2fs: fix to do sanity check with secs_per_zone (bnc#1012382).\n- f2fs: fix to do sanity check with user_block_count (bnc#1012382).\n- f2fs: fix validation of the block count in sanity_check_raw_super (bnc#1012382).\n- f2fs: fix wrong return value of f2fs_acl_create (bnc#1012382).\n- f2fs: free meta pages if sanity check for ckpt is failed (bnc#1012382).\n- f2fs: give -EINVAL for norecovery and rw mount (bnc#1012382).\n- f2fs: introduce and spread verify_blkaddr (bnc#1012382).\n- f2fs: introduce get_checkpoint_version for cleanup (bnc#1012382).\n- f2fs: move dir data flush to write checkpoint process (bnc#1012382).\n- f2fs: move sanity checking of cp into get_valid_checkpoint (bnc#1012382).\n- f2fs: not allow to write illegal blkaddr (bnc#1012382).\n- f2fs: put directory inodes before checkpoint in roll-forward recovery (bnc#1012382).\n- f2fs: read page index before freeing (bnc#1012382).\n- f2fs: remove an obsolete variable (bnc#1012382).\n- f2fs: return error during fill_super (bnc#1012382).\n- f2fs: sanity check on sit entry (bnc#1012382).\n- f2fs: use crc and cp version to determine roll-forward recovery (bnc#1012382).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1106929)\n- Fix incorrect value for X86_FEATURE_TSX_FORCE_ABORT\n- Fix problem with sharetransport= and NFSv4 (bsc#1114893).\n- fs: add the fsnotify call to vfs_iter_write (bnc#1012382).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (bnc#1012382).\n- fs: do not scan the inode cache before SB_BORN is set (bnc#1012382).\n- fs/epoll: drop ovflist branch prediction (bnc#1012382).\n- fs: fix lost error code in dio_complete (bsc#1117744).\n- fuse: call pipe_buf_release() under pipe lock (bnc#1012382).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bnc#1012382).\n- fuse: handle zero sized retrieve correctly (bnc#1012382).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bnc#1012382).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bnc#1012382).\n- gpiolib: Fix return value of gpio_to_desc() stub if !GPIOLIB (Git-fixes).\n- gpio: pl061: handle failed allocations (bnc#1012382).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1106929)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1106929)\n- HID: debug: fix the ring buffer implementation (bnc#1012382).\n- HID: lenovo: Add checks to fix of_led_classdev_register (bnc#1012382).\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bnc#1012382).\n- hwmon: (lm80) fix a missing check of the status of SMBus read (bnc#1012382).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (git-fixes).\n- i2c-axxia: check for error conditions first (bnc#1012382).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bnc#1012382).\n- IB/core: type promotion bug in rdma_rw_init_one_mr() ().\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- IB/rxe: Fix incorrect cache cleanup in error flow ().\n- IB/rxe: replace kvfree with vfree ().\n- igb: Fix an issue that PME is not enabled during runtime suspend (bnc#1012382).\n- inet: frags: add a pointer to struct netns_frags (bnc#1012382).\n- inet: frags: better deal with smp races (bnc#1012382).\n- inet: frags: break the 2GB limit for frags storage (bnc#1012382).\n- inet: frags: change inet_frags_init_net() return value (bnc#1012382).\n- inet: frags: do not clone skb in ip_expire() (bnc#1012382).\n- inet: frags: fix ip6frag_low_thresh boundary (bnc#1012382).\n- inet: frags: get rid of ipfrag_skb_cb/FRAG_CB (bnc#1012382).\n- inet: frags: get rif of inet_frag_evicting() (bnc#1012382).\n- inet: frags: refactor ipfrag_init() (bnc#1012382).\n- inet: frags: refactor ipv6_frag_init() (bnc#1012382).\n- inet: frags: refactor lowpan_net_frag_init() (bnc#1012382).\n- inet: frags: remove inet_frag_maybe_warn_overflow() (bnc#1012382).\n- inet: frags: remove some helpers (bnc#1012382).\n- inet: frags: reorganize struct netns_frags (bnc#1012382).\n- inet: frags: use rhashtables for reassembly units (bnc#1012382).\n- input: bma150 - register input device after setting private data (bnc#1012382).\n- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bnc#1012382).\n- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bnc#1012382).\n- input: mms114 - fix license module information (bsc#1087092).\n- input: xpad - add support for SteelSeries Stratus Duo (bnc#1012382).\n- intel_pstate: Update frequencies of policy-\u003ecpus only from -\u003eset_policy() (bsc#1120017).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/arm-smmu-v3: Use explicit mb() when moving cons pointer (bnc#1012382).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129237).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129238).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129239).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129240).\n- ip: add helpers to process in-order fragments faster (bnc#1012382).\n- ipfrag: really prevent allocation on netns exit (bnc#1012382).\n- ip: frags: fix crash in ip_do_fragment() (bnc#1012382).\n- ipmi:ssif: Fix handling of multi-part return messages (bnc#1012382).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (bnc#1012382).\n- ip: process in-order fragments efficiently (bnc#1012382).\n- ip: use rb trees for IP frag queue (bnc#1012382).\n- ipv4: frags: precedence bug in ip_expire() (bnc#1012382).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (bnc#1012382).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (bnc#1012382).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (bnc#1012382).\n- ipv6: frags: rewrite ip6_expire_frag_queue() (bnc#1012382).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (bnc#1012382).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bnc#1012382).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bnc#1012382).\n- ixgbe: fix crash in build_skb Rx code path (git-fixes).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bnc#1012382).\n- kABI: protect linux/kfifo.h include in hid-debug (kabi).\n- kABI: protect struct hda_bus (kabi).\n- kABI: protect struct inet_peer (kabi).\n- kabi: reorder new slabinfo fields in struct kmem_cache_node (bnc#1116653).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kaweth: use skb_cow_head() to deal with cloned skbs (bnc#1012382).\n- kconfig: fix file name and line number of warn_ignored_character() (bnc#1012382).\n- kconfig: fix memory leak when EOF is encountered in quotation (bnc#1012382).\n- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (bnc#1012382).\n- kernel/hung_task.c: break RCU locks based on jiffies (bnc#1012382).\n- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\n- kvm: arm/arm64: vgic-its: Check CBASER/BASER validity before enabling the ITS (bsc#1109248).\n- kvm: arm/arm64: vgic-its: Check GITS_BASER Valid bit before saving tables (bsc#1109248).\n- kvm: arm/arm64: vgic-its: Fix return value for device table restore (bsc#1109248).\n- kvm: arm/arm64: vgic-its: Fix vgic_its_restore_collection_table returned value (bsc#1109248).\n- kvm: nVMX: Do not halt vcpu when L1 is injecting events to L2 (bsc#1129413).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129414).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129415).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129416).\n- kvm: VMX: Do not allow reexecute_instruction() when skipping MMIO instr (bsc#1129417).\n- kvm: VMX: Fix x2apic check in vmx_msr_bitmap_mode() (bsc#1124166).\n- kvm: VMX: Missing part of upstream commit 904e14fb7cb9 (bsc#1124166).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129418).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: Fix single-step debugging (bnc#1012382).\n- kvm: x86: IA32_ARCH_CAPABILITIES is always supported (bsc#1129419).\n- kvm: x86: svm: report MSR_IA32_MCG_EXT_CTL as unsupported (bnc#1012382).\n- l2tp: copy 4 more bytes to linear part if necessary (bnc#1012382).\n- l2tp: fix reading optional fields of L2TPv3 (bnc#1012382).\n- l2tp: remove l2specific_len dependency in l2tp_core (bnc#1012382).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125810).\n- libceph: handle an empty authorize reply (bsc#1126772).\n- libnvdimm: fix ars_status output length calculation (bsc#1124777).\n- libnvdimm, pfn: Pad pfn namespaces relative to other regions (bsc#1124811).\n- libnvdimm: Use max contiguous area for namespace size (bsc#1124780).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: Fix double mutex_unlock(\u0026loop_ctl_mutex) in loop_control_ioctl() (bnc#1012382).\n- loop: Fold __loop_release into loop_release (bnc#1012382).\n- loop: Get rid of loop_index_mutex (bnc#1012382).\n- LSM: Check for NULL cred-security on free (bnc#1012382).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bnc#1012382).\n- mac80211: fix radiotap vendor presence bitmap handling (bnc#1012382).\n- md: batch flush requests (bsc#1119680).\n- mdio_bus: Fix use-after-free on device_register fails (git-fixes).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bnc#1012382).\n- media: em28xx: Fix misplaced reset of dev-\u003ev4l::field_count (bnc#1012382).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bnc#1012382).\n- media: vb2: be sure to unlock mutex on errors (bnc#1012382).\n- media: vb2: vb2_mmap: move lock up (bnc#1012382).\n- media: vivid: fix error handling of kthread_run (bnc#1012382).\n- media: vivid: set min width/height to a value \u003e 0 (bnc#1012382).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bnc#1012382).\n- mfd: as3722: Handle interrupts on suspend (bnc#1012382).\n- mfd: as3722: Mark PM functions as __maybe_unused (bnc#1012382).\n- mfd: tps6586x: Handle interrupts on suspend (bnc#1012382).\n- misc: vexpress: Off by one in vexpress_syscfg_exec() (bnc#1012382).\n- mISDN: fix a race in dev_expire_timer() (bnc#1012382).\n- mlxsw: pci: Correctly determine if descriptor queue is full (git-fixes).\n- mlxsw: reg: Use correct offset in field definiton (git-fixes).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bnc#1012382).\n- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).\n- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bnc#1012382).\n- mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL (bnc#1012382).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (bnc#1012382).\n- mm: only report isolation failures when offlining memory (generic hotplug debugability).\n- mm, oom: fix use-after-free in oom_kill_process (bnc#1012382).\n- mm, page_alloc: drop should_suppress_show_mem (bnc#1125892, bnc#1106061).\n- mm/page-writeback.c: do not break integrity writeback on -\u003ewritepage() error (bnc#1012382).\n- mm, proc: be more verbose about unstable VMA flags in /proc/\u0026lt;pid\u003e/smaps (bnc#1012382).\n- mm, slab: faster active and free stats (bsc#116653, VM Performance).\n- mm/slab: improve performance of gathering slabinfo stats (bsc#116653, VM Performance).\n- mm, slab: maintain total slab count instead of active count (bsc#116653, VM Performance).\n- modpost: validate symbol names also in find_elf_symbol (bnc#1012382).\n- mtd: rawnand: gpmi: fix MX28 bus master lockup problem (bnc#1012382).\n- net: Add header for usage of fls64() (bnc#1012382).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (bnc#1012382).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (bnc#1012382).\n- net: call sk_dst_reset when set SO_DONTROUTE (bnc#1012382).\n- net: Do not allocate page fragments that are not skb aligned (bnc#1012382).\n- net: dp83640: expire old TX-skb (bnc#1012382).\n- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).\n- net: dsa: mv88e6xxx: fix port VLAN maps (git-fixes).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (bnc#1012382).\n- net: Fix for_each_netdev_feature on Big endian (bnc#1012382).\n- net: fix IPv6 prefix route residue (bnc#1012382).\n- net: fix pskb_trim_rcsum_slow() with odd trim offset (bnc#1012382).\n- net: Fix usage of pskb_trim_rcsum (bnc#1012382).\n- net/hamradio/6pack: Convert timers to use timer_setup() (git-fixes).\n- net/hamradio/6pack: use mod_timer() to rearm timers (git-fixes).\n- net: ieee802154: 6lowpan: fix frag reassembly (bnc#1012382).\n- net: ipv4: do not handle duplicate fragments as overlapping (bnc#1012382 bsc#1116345).\n- net: ipv4: Fix memory leak in network namespace dismantle (bnc#1012382).\n- net: ipv4: use a dedicated counter for icmp_v4 redirect packets (bnc#1012382).\n- net: lan78xx: Fix race in tx pending skb size calculation (git-fixes).\n- net/mlx4_core: Add masking for a few queries on HCA caps (bnc#1012382).\n- net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4: Fix endianness issue in qp context params (git-fixes).\n- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n- net/mlx5e: Fix TCP checksum in LRO buffers (git-fixes).\n- net/mlx5: Fix driver load bad flow when having fw initializing timeout (git-fixes).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Fix use-after-free in self-healing flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net: modify skb_rbtree_purge to return the truesize of all purged skbs (bnc#1012382).\n- net: mv643xx_eth: fix packet corruption with TSO and tiny unaligned packets (git-fixes).\n- net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS (git-fixes).\n- net: phy: bcm7xxx: Fix shadow mode 2 disabling (git-fixes).\n- net: pskb_trim_rcsum() and CHECKSUM_COMPLETE are friends (bnc#1012382).\n- net: qca_spi: Fix race condition in spi transfers (git-fixes).\n- netrom: switch to sock timer API (bnc#1012382).\n- net/rose: fix NULL ax25_cb kernel panic (bnc#1012382).\n- net_sched: refetch skb protocol for each filter (bnc#1012382).\n- net: speed up skb_rbtree_purge() (bnc#1012382).\n- net: stmmac: Fix a race in EEE enable callback (bnc#1012382).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (bnc#1012382).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (git-fixes).\n- net/x25: do not hold the cpu too long in x25_new_lci() (bnc#1012382).\n- NFC: nxp-nci: Include unaligned.h instead of access_ok.h (bnc#1012382).\n- nfit: fix unchecked dereference in acpi_nfit_ctl (bsc#1125014).\n- nfsd4: fix crash on writing v4_end_grace before nfsd startup (bnc#1012382).\n- NFS: nfs_compare_mount_options always compare auth flavors (bnc#1012382).\n- niu: fix missing checks of niu_pci_eeprom_read (bnc#1012382).\n- ocfs2: do not clear bh uptodate for block read (bnc#1012382).\n- ocfs2: fix panic due to unrecovered local alloc (bnc#1012382).\n- omap2fb: Fix stack memory disclosure (bsc#1106929)\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bnc#1012382).\n- packet: Do not leak dev refcounts on error exit (bnc#1012382).\n- pci: altera: Check link status before retrain link (bnc#1012382).\n- pci: altera: Fix altera_pcie_link_is_up() (bnc#1012382).\n- pci: altera: Move retrain from fixup to altera_pcie_host_init() (bnc#1012382).\n- pci: altera: Poll for link training status after retraining the link (bnc#1012382).\n- pci: altera: Poll for link up status after retraining the link (bnc#1012382).\n- pci: altera: Reorder read/write functions (bnc#1012382).\n- pci: altera: Rework config accessors for use without a struct pci_bus (bnc#1012382).\n- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1129241).\n- perf/core: Do not WARN() for impossible ring-buffer sizes (bnc#1012382).\n- perf/core: Fix impossible ring-buffer sizes warning (bnc#1012382).\n- perf intel-pt: Fix error with config term \u0027pt=0\u0027 (bnc#1012382).\n- perf parse-events: Fix unchecked usage of strncpy() (bnc#1012382).\n- perf svghelper: Fix unchecked usage of strncpy() (bnc#1012382).\n- perf tests evsel-tp-sched: Fix bitwise operator (bnc#1012382).\n- perf tools: Add Hygon Dhyana support (bnc#1012382).\n- perf unwind: Take pgoff into account when reporting elf to libdwfl (bnc#1012382).\n- perf unwind: Unwind with libdw does not take symfs into account (bnc#1012382).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- perf/x86/intel/uncore: Add Node ID mask (bnc#1012382).\n- phy: micrel: Ensure interrupts are reenabled on resume (git-fixes).\n- pinctrl: msm: fix gpio-hog related boot issues (bnc#1012382).\n- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bnc#1012382).\n- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bnc#1012382).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bnc#1012382).\n- platform/x86: thinkpad_acpi: Proper model/release matching (bsc#1099810).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc, hotplug: Avoid to touch non-existent cpumasks (bsc#1109695).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- powerpc/pseries: Add CPU dlpar remove functionality (bsc#1128756).\n- powerpc/pseries: add of_node_put() in dlpar_detach_node() (bnc#1012382).\n- powerpc/pseries: Consolidate CPU hotplug code to hotplug-cpu.c (bsc#1128756).\n- powerpc/pseries/cpuidle: Fix preempt warning (bnc#1012382).\n- powerpc/pseries: Factor out common cpu hotplug code (bsc#1128756).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1128756).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/uaccess: fix warning/error with access_ok() (bnc#1012382).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- pppoe: fix reception of frames with no mac header (git-fixes).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc: Remove empty line in /proc/self/status (bnc#1012382 bsc#1094823).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- pstore/ram: Do not treat empty buffers as valid (bnc#1012382).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bnc#1012382).\n- r8169: Add support for new Realtek Ethernet (bnc#1012382).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125808).\n- rcu: Force boolean subscript for expedited stall warnings (bnc#1012382).\n- RDMA/bnxt_re: Fix a couple off by one bugs (bsc#1020413, ).\n- RDMA/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446).\n- Revert \u0027bs-upload-kernel: do not set %opensuse_bs\u0027 This reverts commit e89e2b8cbef05df6c874ba70af3cb4c57f82a821.\n- Revert \u0027cifs: In Kconfig CONFIG_CIFS_POSIX needs depends on legacy (insecure cifs)\u0027 (bnc#1012382).\n- Revert \u0027exec: load_script: do not blindly truncate shebang string\u0027 (bnc#1012382).\n- Revert \u0027Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G\u0027 (bnc#1012382).\n- Revert \u0027loop: Fix double mutex_unlock(\u0026loop_ctl_mutex) in loop_control_ioctl()\u0027 (bnc#1012382).\n- Revert \u0027loop: Fold __loop_release into loop_release\u0027 (bnc#1012382).\n- Revert \u0027loop: Get rid of loop_index_mutex\u0027 (bnc#1012382).\n- Revert \u0027mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1120902).\u0027 The backport patch does not built properly.\n- Revert \u0027mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL\u0027 (bnc#1012382).\n- Revert \u0027net: stmmac: Fix a race in EEE enable callback (git-fixes).\u0027 This reverts commit f323fa8d233c1f44aff17e6fae90c2c8be30edf9. The patch was already included in stable 4.4.176.\n- Revert \u0027sd: disable logical block provisioning if \u0027lbpme\u0027 is not set\u0027 This reverts commit 96370bd87299c7a6883b3e2bf13818f60c8ba611. Patch not accepted upstream.\n- Revert \u0027x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls\u0027 (bsc#1128565).\n- rhashtable: Add rhashtable_lookup() (bnc#1012382).\n- rhashtable: add rhashtable_lookup_get_insert_key() (bnc#1012382 bsc#1042286).\n- rhashtable: add schedule points (bnc#1012382).\n- rhashtable: reorganize struct rhashtable layout (bnc#1012382).\n- s390/early: improve machine detection (bnc#1012382).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (bnc#1012382).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (bnc#1012382).\n- sata_rcar: fix deferred probing (bnc#1012382).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- scripts/decode_stacktrace: only strip base path when a prefix of the path (bnc#1012382).\n- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes\n- scsi: aacraid: Fix missing break in switch statement (bsc#1128696).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: lpfc: Correct LCB RJT handling (bnc#1012382).\n- scsi: lpfc: Correct MDS diag and nvmet configuration (bsc#1125796).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1127725).\n- scsi: megaraid: fix out-of-bound array accesses (bnc#1012382).\n- scsi: mpt3sas: Add an I/O barrier (bsc#1117108).\n- scsi: mpt3sas: Added support for nvme encapsulated request message (bsc#1117108).\n- scsi: mpt3sas: Added support for SAS Device Discovery Error Event (bsc#1117108).\n- scsi: mpt3sas: Adding support for SAS3616 HBA device (bsc#1117108).\n- scsi: mpt3sas: Add ioc_\u0026lt;level\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Add nvme device support in slave alloc, target alloc and probe (bsc#1117108).\n- scsi: mpt3sas: Add PCI device ID for Andromeda (bsc#1117108).\n- scsi: mpt3sas: Add-Task-management-debug-info-for-NVMe-drives (bsc#1117108).\n- scsi: mpt3sas: Allow processing of events during driver unload (bsc#1117108).\n- scsi: mpt3sas: always use first reserved smid for ioctl passthrough (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: API\u0027s to remove nvme drive from sml (bsc#1117108).\n- scsi: mpt3sas: API \u0027s to support NVMe drive addition to SML (bsc#1117108).\n- scsi: mpt3sas: As per MPI-spec, use combined reply queue for SAS3.5 controllers when HBA supports more than 16 MSI-x vectors (bsc#1117108).\n- scsi: mpt3sas: Bug fix for big endian systems (bsc#1117108).\n- scsi: mpt3sas: Bump mpt3sas driver version to v16.100.00.00 (bsc#1117108).\n- scsi: mpt3sas: Cache enclosure pages during enclosure add (bsc#1117108).\n- scsi: mpt3sas: check command status before attempting abort (bsc#1117108).\n- scsi: mpt3sas: clarify mmio pointer types (bsc#1117108).\n- scsi: mpt3sas: cleanup _scsih_pcie_enumeration_event() (bsc#1117108).\n- scsi: mpt3sas: Configure reply post queue depth, DMA and sgl tablesize (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u0026lt;level\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u0026lt;level\u003e with MPT3SAS_FMT to ioc_\u0026lt;level\u003e (bsc#1117108).\n- scsi: mpt3sas: Display chassis slot information of the drive (bsc#1117108).\n- scsi: mpt3sas: Do not abort I/Os issued to NVMe drives while processing Async Broadcast primitive event (bsc#1117108).\n- scsi: mpt3sas: Do not access the structure after decrementing it\u0027s instance reference count (bsc#1117108).\n- scsi: mpt3sas: Do not use 32-bit atomic request descriptor for Ventura controllers (bsc#1117108).\n- scsi: mpt3sas: Enhanced handling of Sense Buffer (bsc#1117108).\n- scsi: mpt3sas: fix an out of bound write (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix calltrace observed while running IO \u0026 reset (bsc#1117108).\n- scsi: mpt3sas: fix dma_addr_t casts (bsc#1117108).\n- scsi: mpt3sas: Fixed memory leaks in driver (bsc#1117108).\n- scsi: mpt3sas: Fix, False timeout prints for ioctl and other internal commands during controller reset (bsc#1117108).\n- scsi: mpt3sas: fix format overflow warning (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Fix memory allocation failure test in \u0027mpt3sas_base_attach()\u0027 (bsc#1117108).\n- scsi: mpt3sas: Fix nvme drives checking for tlr (bsc#1117108).\n- scsi: mpt3sas: fix oops in error handlers after shutdown/unload (bsc#1117108).\n- scsi: mpt3sas: Fix possibility of using invalid Enclosure Handle for SAS device after host reset (bsc#1117108).\n- scsi: mpt3sas: fix possible memory leak (bsc#1117108).\n- scsi: mpt3sas: fix pr_info message continuation (bsc#1117108).\n- scsi: mpt3sas: Fix removal and addition of vSES device during host reset (bsc#1117108).\n- scsi: mpt3sas: Fix sparse warnings (bsc#1117108).\n- scsi: mpt3sas: fix spelling mistake: \u0027disbale\u0027 -\u003e \u0027disable\u0027 (bsc#1117108).\n- scsi: mpt3sas: For NVME device, issue a protocol level reset (bsc#1117108).\n- scsi: mpt3sas: Handle NVMe PCIe device related events generated from firmware (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Incorrect command status was set/marked as not used (bsc#1117108).\n- scsi: mpt3sas: Increase event log buffer to support 24 port HBA\u0027s (bsc#1117108).\n- scsi: mpt3sas: Introduce API to get BAR0 mapped buffer address (bsc#1117108).\n- scsi: mpt3sas: Introduce Base function for cloning (bsc#1117108).\n- scsi: mpt3sas: Introduce function to clone mpi reply (bsc#1117108).\n- scsi: mpt3sas: Introduce function to clone mpi request (bsc#1117108).\n- scsi: mpt3sas: Introduce mpt3sas_get_st_from_smid() (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Lockless access for chain buffers (bsc#1117108).\n- scsi: mpt3sas: lockless command submission (bsc#1117108).\n- scsi: mpt3sas: make function _get_st_from_smid static (bsc#1117108).\n- scsi: mpt3sas: NVMe drive support for BTDHMAPPING ioctl command and log info (bsc#1117108).\n- scsi: mpt3sas: open-code _scsih_scsi_lookup_get() (bsc#1117108).\n- scsi: mpt3sas: Optimize I/O memory consumption in driver (bsc#1117108).\n- scsi: mpt3sas: Pre-allocate RDPQ Array at driver boot time (bsc#1117108).\n- scsi: mpt3sas: Processing of Cable Exception events (bsc#1117108).\n- scsi: mpt3sas: Reduce memory footprint in kdump kernel (bsc#1117108).\n- scsi: mpt3sas: remove a stray KERN_INFO (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: remove redundant copy_from_user in _ctl_getiocinfo (bsc#1117108).\n- scsi: mpt3sas: remove redundant wmb (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Remove unused variable requeue_event (bsc#1117108).\n- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).\n- scsi: mpt3sas: Replace PCI pool old API (bsc#1117108).\n- scsi: mpt3sas: Report Firmware Package Version from HBA Driver (bsc#1117108).\n- scsi: mpt3sas: scan and add nvme device after controller reset (bsc#1117108).\n- scsi: mpt3sas: separate out _base_recovery_check() (bsc#1117108).\n- scsi: mpt3sas: set default value for cb_idx (bsc#1117108).\n- scsi: mpt3sas: Set NVMe device queue depth as 128 (bsc#1117108).\n- scsi: mpt3sas: SGL to PRP Translation for I/Os to NVMe devices (bsc#1117108).\n- scsi: mpt3sas: simplify mpt3sas_scsi_issue_tm() (bsc#1117108).\n- scsi: mpt3sas: simplify task management functions (bsc#1117108).\n- scsi: mpt3sas: simplify _wait_for_commands_to_complete() (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: switch to pci_alloc_irq_vectors (bsc#1117108).\n- scsi: mpt3sas: Updated MPI headers to v2.00.48 (bsc#1117108).\n- scsi: mpt3sas: Update driver version \u002725.100.00.00\u0027 (bsc#1117108).\n- scsi: mpt3sas: Update driver version \u002726.100.00.00\u0027 (bsc#1117108).\n- scsi: mpt3sas: Update MPI Headers (bsc#1117108).\n- scsi: mpt3sas: Update mpt3sas driver version (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mpt3sas: use list_splice_init() (bsc#1117108).\n- scsi: mpt3sas: wait for and flush running commands on shutdown/unload (bsc#1117108).\n- scsi: qla2xxx: Fix deadlock between ATIO and HW lock (bsc#1125794).\n- scsi: qla2xxx: Fix early srb free on abort (bsc#1121713).\n- scsi: qla2xxx: Fix for double free of SRB structure (bsc#1121713).\n- scsi: qla2xxx: Increase abort timeout value (bsc#1121713).\n- scsi: qla2xxx: Move {get|rel}_sp to base_qpair struct (bsc#1121713).\n- scsi: qla2xxx: Return switch command on a timeout (bsc#1121713).\n- scsi: qla2xxx: Turn off IOCB timeout timer on IOCB completion (bsc#1121713).\n- scsi: qla2xxx: Use correct qpair for ABTS/CMD (bsc#1121713).\n- scsi: sd: Fix cache_type_store() (bnc#1012382).\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).\n- scsi: target: use consistent left-aligned ASCII INQUIRY data (bnc#1012382).\n- sctp: allocate sctp_sockaddr_entry with kzalloc (bnc#1012382).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selinux: fix GPF on invalid policy (bnc#1012382).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bnc#1012382).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bnc#1012382).\n- series.conf: Move \u0027patches.fixes/aio-hold-an-extra-file-reference-over-AIO-read-write.patch\u0027 into sorted section.\n- signal: Always notice exiting tasks (bnc#1012382).\n- signal: Better detection of synchronous signals (bnc#1012382).\n- signal: Restore the stop PTRACE_EVENT_EXIT (bnc#1012382).\n- skge: potential memory corruption in skge_get_regs() (bnc#1012382).\n- sky2: Increase D3 delay again (bnc#1012382).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (bnc#1012382).\n- smack: fix access permissions for keyring (bnc#1012382).\n- smsc95xx: Use skb_cow_head to deal with cloned skbs (bnc#1012382).\n- soc/tegra: Do not leak device tree node reference (bnc#1012382).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bnc#1012382).\n- staging: iio: ad7780: update voltage on read (bnc#1012382).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bnc#1012382).\n- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bnc#1012382).\n- sunrpc: handle ENOMEM in rpcb_getport_async (bnc#1012382).\n- sunvdc: Do not spin in an infinite loop when vio_ldc_send() returns EAGAIN (bnc#1012382).\n- sysfs: Disable lockdep for driver bind/unbind files (bnc#1012382).\n- tcp: clear icsk_backoff in tcp_write_queue_purge() (bnc#1012382).\n- tcp: tcp_v4_err() should be more careful (bnc#1012382).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bnc#1012382).\n- team: Free BPF filter when unregistering netdev (git-fixes).\n- test_hexdump: use memcpy instead of strncpy (bnc#1012382).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bnc#1012382).\n- timekeeping: Use proper seqcount initializer (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bnc#1012382).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bnc#1012382).\n- tipc: use destination length for copy string (bnc#1012382).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bnc#1012382).\n- tty: Do not block on IO when ldisc change is pending (bnc#1105428).\n- tty: Do not hold ldisc lock in tty_reopen() if ldisc present (bnc#1105428).\n- tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).\n- tty: Handle problem if line discipline does not have receive_buf (bnc#1012382).\n- tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).\n- tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).\n- tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).\n- tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).\n- tty/ldsem: Wake up readers after timed out down_write() (bnc#1012382).\n- tty/n_hdlc: fix __might_sleep warning (bnc#1012382).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bnc#1012382).\n- tty: Simplify tty-\u003ecount math in tty_reopen() (bnc#1105428).\n- uapi/if_ether.h: move __UAPI_DEF_ETHHDR libc define (bnc#1012382).\n- uapi/if_ether.h: prevent redefinition of struct ethhdr (bnc#1012382).\n- ucc_geth: Reset BQL queue when stopping device (bnc#1012382).\n- udf: Fix BUG on corrupted inode (bnc#1012382).\n- um: Avoid marking pages with \u0027changed protection\u0027 (bnc#1012382).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bnc#1012382).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bnc#1012382).\n- usb: dwc2: Remove unnecessary kfree (bnc#1012382).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bnc#1012382).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bnc#1012382).\n- usb: phy: am335x: fix race condition in _probe (bnc#1012382).\n- usb: serial: pl2303: add new PID to support PL2303TB (bnc#1012382).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bnc#1012382).\n- usb: storage: add quirk for SMI SM3350 (bnc#1012382).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bnc#1012382).\n- video: clps711x-fb: release disp device node in probe() (bnc#1012382).\n- vsock: cope with memory allocation failure at socket creation time (bnc#1012382).\n- vt: invoke notifier on screen size change (bnc#1012382).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling netif_rx() (bnc#1012382).\n- wireless: airo: potential buffer overflow in sprintf() (bsc#1120902).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/a.out: Clear the dump structure initially (bnc#1012382).\n- x86/fpu: Add might_fault() to user_insn() (bnc#1012382).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bnc#1012382).\n- x86: livepatch: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).\n- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bnc#1012382).\n- x86/PCI: Fix Broadcom CNB20LE unintended sign extension (redux) (bnc#1012382).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1106105).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bnc#1012382).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfrm6_tunnel: Fix spi check in __xfrm6_tunnel_alloc_spi (bnc#1012382).\n- xfrm: refine validation of template and selector families (bnc#1012382).\n- Yama: Check for pid death before checking ancestry (bnc#1012382).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-901,SUSE-SLE-SERVER-12-SP3-2019-901", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0901-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0901-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190901-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0901-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-April/005309.html" }, { "category": "self", "summary": "SUSE Bug 1012382", "url": "https://bugzilla.suse.com/1012382" }, { "category": "self", "summary": "SUSE Bug 1020413", "url": "https://bugzilla.suse.com/1020413" }, { "category": "self", "summary": "SUSE Bug 1023175", "url": "https://bugzilla.suse.com/1023175" }, { "category": "self", "summary": "SUSE Bug 1031492", "url": "https://bugzilla.suse.com/1031492" }, { "category": "self", "summary": "SUSE Bug 1042286", "url": "https://bugzilla.suse.com/1042286" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1070767", "url": "https://bugzilla.suse.com/1070767" }, { "category": "self", "summary": "SUSE Bug 1075697", "url": "https://bugzilla.suse.com/1075697" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086652", "url": "https://bugzilla.suse.com/1086652" }, { "category": "self", "summary": "SUSE Bug 1087036", "url": "https://bugzilla.suse.com/1087036" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1090435", "url": "https://bugzilla.suse.com/1090435" }, { "category": "self", "summary": "SUSE Bug 1094823", "url": "https://bugzilla.suse.com/1094823" }, { "category": "self", "summary": "SUSE Bug 1099810", "url": "https://bugzilla.suse.com/1099810" }, { "category": "self", "summary": "SUSE Bug 1102875", "url": "https://bugzilla.suse.com/1102875" }, { "category": "self", "summary": "SUSE Bug 1102877", "url": "https://bugzilla.suse.com/1102877" }, { "category": "self", "summary": "SUSE Bug 1102879", "url": "https://bugzilla.suse.com/1102879" }, { "category": "self", "summary": "SUSE Bug 1102882", "url": "https://bugzilla.suse.com/1102882" }, { "category": "self", "summary": "SUSE Bug 1102896", "url": "https://bugzilla.suse.com/1102896" }, { "category": "self", "summary": "SUSE Bug 1102959", "url": "https://bugzilla.suse.com/1102959" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1105428", "url": "https://bugzilla.suse.com/1105428" }, { "category": "self", "summary": "SUSE Bug 1106061", "url": "https://bugzilla.suse.com/1106061" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106929", "url": "https://bugzilla.suse.com/1106929" }, { "category": "self", "summary": "SUSE Bug 1107866", "url": "https://bugzilla.suse.com/1107866" }, { "category": "self", "summary": "SUSE Bug 1109137", "url": "https://bugzilla.suse.com/1109137" }, { "category": "self", "summary": "SUSE Bug 1109248", "url": "https://bugzilla.suse.com/1109248" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1116345", "url": "https://bugzilla.suse.com/1116345" }, { "category": "self", "summary": "SUSE Bug 1116653", "url": "https://bugzilla.suse.com/1116653" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1117744", "url": "https://bugzilla.suse.com/1117744" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119680", "url": "https://bugzilla.suse.com/1119680" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120017", "url": "https://bugzilla.suse.com/1120017" }, { "category": "self", "summary": "SUSE Bug 1120691", "url": "https://bugzilla.suse.com/1120691" }, { "category": "self", "summary": "SUSE Bug 1120722", "url": "https://bugzilla.suse.com/1120722" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1121713", "url": "https://bugzilla.suse.com/1121713" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122650", "url": "https://bugzilla.suse.com/1122650" }, { "category": "self", "summary": "SUSE Bug 1122651", "url": "https://bugzilla.suse.com/1122651" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1123321", "url": "https://bugzilla.suse.com/1123321" }, { "category": "self", "summary": "SUSE Bug 1123323", "url": "https://bugzilla.suse.com/1123323" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE Bug 1123933", "url": "https://bugzilla.suse.com/1123933" }, { "category": "self", "summary": "SUSE Bug 1124166", "url": "https://bugzilla.suse.com/1124166" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1124775", "url": "https://bugzilla.suse.com/1124775" }, { "category": "self", "summary": "SUSE Bug 1124777", "url": "https://bugzilla.suse.com/1124777" }, { "category": "self", "summary": "SUSE Bug 1124780", "url": "https://bugzilla.suse.com/1124780" }, { "category": "self", "summary": "SUSE Bug 1124811", "url": "https://bugzilla.suse.com/1124811" }, { "category": "self", "summary": "SUSE Bug 1125000", "url": "https://bugzilla.suse.com/1125000" }, { "category": "self", "summary": "SUSE Bug 1125014", "url": "https://bugzilla.suse.com/1125014" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125446", "url": "https://bugzilla.suse.com/1125446" }, { "category": "self", "summary": "SUSE Bug 1125794", "url": "https://bugzilla.suse.com/1125794" }, { "category": "self", "summary": "SUSE Bug 1125796", "url": "https://bugzilla.suse.com/1125796" }, { "category": "self", "summary": "SUSE Bug 1125808", "url": "https://bugzilla.suse.com/1125808" }, { "category": "self", "summary": "SUSE Bug 1125809", "url": "https://bugzilla.suse.com/1125809" }, { "category": "self", "summary": "SUSE Bug 1125810", "url": "https://bugzilla.suse.com/1125810" }, { "category": "self", "summary": "SUSE Bug 1125892", "url": "https://bugzilla.suse.com/1125892" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126772", "url": "https://bugzilla.suse.com/1126772" }, { "category": "self", "summary": "SUSE Bug 1126773", "url": "https://bugzilla.suse.com/1126773" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127155", "url": "https://bugzilla.suse.com/1127155" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127725", "url": "https://bugzilla.suse.com/1127725" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128452", "url": "https://bugzilla.suse.com/1128452" }, { "category": "self", "summary": "SUSE Bug 1128565", "url": "https://bugzilla.suse.com/1128565" }, { "category": "self", "summary": "SUSE Bug 1128696", "url": "https://bugzilla.suse.com/1128696" }, { "category": "self", "summary": "SUSE Bug 1128756", "url": "https://bugzilla.suse.com/1128756" }, { "category": "self", "summary": "SUSE Bug 1128893", "url": "https://bugzilla.suse.com/1128893" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129237", "url": "https://bugzilla.suse.com/1129237" }, { "category": "self", "summary": "SUSE Bug 1129238", "url": "https://bugzilla.suse.com/1129238" }, { "category": "self", "summary": "SUSE Bug 1129239", "url": "https://bugzilla.suse.com/1129239" }, { "category": "self", "summary": "SUSE Bug 1129240", "url": "https://bugzilla.suse.com/1129240" }, { "category": "self", "summary": "SUSE Bug 1129241", "url": "https://bugzilla.suse.com/1129241" }, { "category": "self", "summary": "SUSE Bug 1129413", "url": "https://bugzilla.suse.com/1129413" }, { "category": "self", "summary": "SUSE Bug 1129414", "url": "https://bugzilla.suse.com/1129414" }, { "category": "self", "summary": "SUSE Bug 1129415", "url": "https://bugzilla.suse.com/1129415" }, { "category": "self", "summary": "SUSE Bug 1129416", "url": "https://bugzilla.suse.com/1129416" }, { "category": "self", "summary": "SUSE Bug 1129417", "url": "https://bugzilla.suse.com/1129417" }, { "category": "self", "summary": "SUSE Bug 1129418", "url": "https://bugzilla.suse.com/1129418" }, { "category": "self", "summary": "SUSE Bug 1129419", "url": "https://bugzilla.suse.com/1129419" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE CVE CVE-2017-18249 page", "url": "https://www.suse.com/security/cve/CVE-2017-18249/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-04-08T09:49:53Z", "generator": { "date": "2019-04-08T09:49:53Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0901-1", "initial_release_date": "2019-04-08T09:49:53Z", "revision_history": [ { "date": "2019-04-08T09:49:53Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.4.176-4.25.1.noarch", "product": { "name": "kernel-devel-azure-4.4.176-4.25.1.noarch", "product_id": "kernel-devel-azure-4.4.176-4.25.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.4.176-4.25.1.noarch", "product": { "name": "kernel-source-azure-4.4.176-4.25.1.noarch", "product_id": "kernel-source-azure-4.4.176-4.25.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.4.176-4.25.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.4.176-4.25.1.x86_64", "product_id": "cluster-md-kmp-azure-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.4.176-4.25.1.x86_64", "product": { "name": "dlm-kmp-azure-4.4.176-4.25.1.x86_64", "product_id": "dlm-kmp-azure-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.4.176-4.25.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.4.176-4.25.1.x86_64", "product_id": "gfs2-kmp-azure-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.4.176-4.25.1.x86_64", "product": { "name": "kernel-azure-4.4.176-4.25.1.x86_64", "product_id": "kernel-azure-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.4.176-4.25.1.x86_64", "product": { "name": "kernel-azure-base-4.4.176-4.25.1.x86_64", "product_id": "kernel-azure-base-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.4.176-4.25.1.x86_64", "product": { "name": "kernel-azure-devel-4.4.176-4.25.1.x86_64", "product_id": "kernel-azure-devel-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.4.176-4.25.1.x86_64", "product": { "name": "kernel-azure-extra-4.4.176-4.25.1.x86_64", "product_id": "kernel-azure-extra-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-4.4.176-4.25.1.x86_64", "product": { "name": "kernel-azure-kgraft-4.4.176-4.25.1.x86_64", "product_id": "kernel-azure-kgraft-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.4.176-4.25.1.x86_64", "product": { "name": "kernel-syms-azure-4.4.176-4.25.1.x86_64", "product_id": "kernel-syms-azure-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.4.176-4.25.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.4.176-4.25.1.x86_64", "product_id": "kselftests-kmp-azure-4.4.176-4.25.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.4.176-4.25.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.4.176-4.25.1.x86_64", "product_id": "ocfs2-kmp-azure-4.4.176-4.25.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP3", "product": { "name": "SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-azure-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-azure-base-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-azure-devel-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.4.176-4.25.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch" }, "product_reference": "kernel-devel-azure-4.4.176-4.25.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.4.176-4.25.1.noarch as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch" }, "product_reference": "kernel-source-azure-4.4.176-4.25.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3", "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-syms-azure-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-azure-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-azure-base-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-azure-devel-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.4.176-4.25.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch" }, "product_reference": "kernel-devel-azure-4.4.176-4.25.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.4.176-4.25.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch" }, "product_reference": "kernel-source-azure-4.4.176-4.25.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.4.176-4.25.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" }, "product_reference": "kernel-syms-azure-4.4.176-4.25.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-18249", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-18249" } ], "notes": [ { "category": "general", "text": "The add_free_nid function in fs/f2fs/node.c in the Linux kernel before 4.12 does not properly track an allocated nid, which allows local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-18249", "url": "https://www.suse.com/security/cve/CVE-2017-18249" }, { "category": "external", "summary": "SUSE Bug 1087036 for CVE-2017-18249", "url": "https://bugzilla.suse.com/1087036" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "moderate" } ], "title": "CVE-2017-18249" }, { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "important" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "important" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-base-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-azure-devel-4.4.176-4.25.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-azure-4.4.176-4.25.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-azure-4.4.176-4.25.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-08T09:49:53Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
suse-su-2019:1289-1
Vulnerability from csaf_suse
Published
2019-05-28 11:38
Modified
2019-05-28 11:38
Summary
Security update for the Linux Kernel
Notes
Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.
Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)
- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)
- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)
- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)
- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
This kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.
For more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736
The following security bugs were fixed:
- CVE-2016-10741: fs/xfs/xfs_aops.c allowed local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure (bnc#1114920 bnc#1124010).
- CVE-2017-1000407: By flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic (bnc#1071021).
- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).
- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).
- CVE-2017-7472: The KEYS subsystem allowed local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bnc#1034862).
- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. (bnc#1107829).
- CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c did not always fill RSB upon a context switch, which made it easier for attackers to conduct userspace-userspace spectreRSB attacks (bnc#1102517 bnc#1105296).
- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).
- CVE-2018-18281: The mremap() syscall performed TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).
- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).
- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).
- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).
- CVE-2018-19985: The function hso_get_config_data in drivers/net/usb/hso.c read if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allowed arbitrary read in the kernel address space (bnc#1120743).
- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).
- CVE-2018-5391: The Linux kernel was vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bnc#1103097).
- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108498).
- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).
- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c had multiple race conditions (bnc#1133188). The line discipline was disabled.
- CVE-2019-3459: A heap address information leak while using L2CAP_GET_CONF_OPT was discovered (bnc#1120758).
- CVE-2019-3460: A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found (bnc#1120758).
- CVE-2019-3882: A flaw was found vfio interface implementation that permitted violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). (bnc#1131416 bnc#1131427).
- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).
- CVE-2019-7221: The KVM implementation had a Use-after-Free (bnc#1124732).
- CVE-2019-7222: The KVM implementation had an Information Leak (bnc#1124735).
- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).
- CVE-2019-9503: Multiple brcmfmac frame validation bypasses have been fixed (bnc#1132828).
The following non-security bugs were fixed:
- cifs: Check for timeout on Negotiate stage (bsc#1091171 bsc#1126890).
- fix pgd underflow (bnc#1104475) (bsc#1104475, bsc#1110768).
- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID (bsc#1111331).
- locking/atomics, asm-generic: Move some macros from <linux/bitops.h> to a new <linux/bits.h> file (bsc#1111331).
- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).
- sched/core: Optimize SCHED_SMT (bsc#1111331)
- sched/smt: Expose sched_smt_present static key (bsc#1106913).
- sched/smt: Make sched_smt_present track topology (bsc#1106913).
- sched/smt: Update sched_smt_present at runtime (bsc#1111331)
- tcp: prevent bogus FRTO undos with non-SACK flows (bsc#1086535).
- x86/bugs: Rename SSBD_NO to SSB_NO (bsc#1111331)
- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).
- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bsc#1111331).
- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (bsc#1111331).
- x86/mce: Improve error message when kernel cannot recover, p2 (bsc#1114648).
- x86/msr-index: Cleanup bit defines (bsc#1111331).
- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).
- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).
- x86/speculation: Consolidate CPU whitelists (bsc#1111331).
- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).
- x86/speculation/mds: Add basic bug infrastructure for MDS (bsc#1111331).
- x86/speculation/mds: Add BUG_MSBDS_ONLY (bsc#1111331).
- x86/speculation/mds: Add mds_clear_cpu_buffers() (bsc#1111331).
- x86/speculation/mds: Add mitigation control for MDS (bsc#1111331).
- x86/speculation/mds: Add mitigation mode VMWERV (bsc#1111331).
- x86/speculation/mds: Add sysfs reporting for MDS (bsc#1111331).
- x86/speculation/mds: Clear CPU buffers on exit to user (bsc#1111331).
- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (bsc#1111331).
- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1111331).
- x86/speculation: Rework SMT state change (bsc#1111331).
- x86/speculation: Simplify the CPU bug detection logic (bsc#1111331).
- x86/uaccess: Do not leak the AC flag into __put_user() value evaluation (bsc#1114648).
- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1114920).
- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).
- xfs: stop searching for free slots in an inode chunk when there are none (bsc#1115007).
- xfs: xfs_iget_check_free_state: Use correct sign for errors (bsc#1122015, bsc#1100001).
- xfs: validate sb_logsunit is a multiple of the fs blocksize (bsc#1115038).
Patchnames
SUSE-2019-1289,SUSE-SLE-Module-Public-Cloud-12-2019-1289,SUSE-SLE-SAP-12-SP1-2019-1289,SUSE-SLE-SERVER-12-SP1-2019-1289
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP1 LTSS kernel was updated to receive various security and bugfixes.\n\nFour new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331)\n\n- CVE-2018-12126: Microarchitectural Store Buffer Data Sampling (MSBDS)\n- CVE-2018-12127: Microarchitectural Fill Buffer Data Sampling (MFBDS)\n- CVE-2018-12130: Microarchitectural Load Port Data Samling (MLPDS)\n- CVE-2019-11091: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)\n\nThis kernel update contains software mitigations for these issues, which also utilize CPU microcode updates shipped in parallel.\n\nFor more information on this set of information leaks, check out https://www.suse.com/support/kb/doc/?id=7023736\n\nThe following security bugs were fixed:\n\n- CVE-2016-10741: fs/xfs/xfs_aops.c allowed local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure (bnc#1114920 bnc#1124010).\n- CVE-2017-1000407: By flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic (bnc#1071021).\n- CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).\n- CVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).\n- CVE-2017-7472: The KEYS subsystem allowed local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls (bnc#1034862).\n- CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. (bnc#1107829).\n- CVE-2018-15572: The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c did not always fill RSB upon a context switch, which made it easier for attackers to conduct userspace-userspace spectreRSB attacks (bnc#1102517 bnc#1105296).\n- CVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).\n- CVE-2018-18281: The mremap() syscall performed TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n- CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).\n- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n- CVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).\n- CVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).\n- CVE-2018-19985: The function hso_get_config_data in drivers/net/usb/hso.c read if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allowed arbitrary read in the kernel address space (bnc#1120743).\n- CVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).\n- CVE-2018-5391: The Linux kernel was vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size (bnc#1103097).\n- CVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. (bnc#1108498).\n- CVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).\n- CVE-2019-11486: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c had multiple race conditions (bnc#1133188). The line discipline was disabled.\n- CVE-2019-3459: A heap address information leak while using L2CAP_GET_CONF_OPT was discovered (bnc#1120758).\n- CVE-2019-3460: A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found (bnc#1120758).\n- CVE-2019-3882: A flaw was found vfio interface implementation that permitted violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). (bnc#1131416 bnc#1131427).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).\n- CVE-2019-7221: The KVM implementation had a Use-after-Free (bnc#1124732).\n- CVE-2019-7222: The KVM implementation had an Information Leak (bnc#1124735).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-9503: Multiple brcmfmac frame validation bypasses have been fixed (bnc#1132828).\n\nThe following non-security bugs were fixed:\n\n- cifs: Check for timeout on Negotiate stage (bsc#1091171 bsc#1126890).\n- fix pgd underflow (bnc#1104475) (bsc#1104475, bsc#1110768).\n- kvm: x86: Report STIBP on GET_SUPPORTED_CPUID (bsc#1111331).\n- locking/atomics, asm-generic: Move some macros from \u003clinux/bitops.h\u003e to a new \u003clinux/bits.h\u003e file (bsc#1111331).\n- net: ipv4: do not handle duplicate fragments as overlapping (bsc#1116345).\n- sched/core: Optimize SCHED_SMT (bsc#1111331)\n- sched/smt: Expose sched_smt_present static key (bsc#1106913).\n- sched/smt: Make sched_smt_present track topology (bsc#1106913).\n- sched/smt: Update sched_smt_present at runtime (bsc#1111331)\n- tcp: prevent bogus FRTO undos with non-SACK flows (bsc#1086535).\n- x86/bugs: Rename SSBD_NO to SSB_NO (bsc#1111331)\n- x86/cpu: Sanitize FAM6_ATOM naming (bsc#1111331).\n- x86/kvm: Expose X86_FEATURE_MD_CLEAR to guests (bsc#1111331).\n- x86/kvm/vmx: Add MDS protection when L1D Flush is not active (bsc#1111331).\n- x86/mce: Improve error message when kernel cannot recover, p2 (bsc#1114648).\n- x86/msr-index: Cleanup bit defines (bsc#1111331).\n- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).\n- x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).\n- x86/speculation: Consolidate CPU whitelists (bsc#1111331).\n- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).\n- x86/speculation/mds: Add basic bug infrastructure for MDS (bsc#1111331).\n- x86/speculation/mds: Add BUG_MSBDS_ONLY (bsc#1111331).\n- x86/speculation/mds: Add mds_clear_cpu_buffers() (bsc#1111331).\n- x86/speculation/mds: Add mitigation control for MDS (bsc#1111331).\n- x86/speculation/mds: Add mitigation mode VMWERV (bsc#1111331).\n- x86/speculation/mds: Add sysfs reporting for MDS (bsc#1111331).\n- x86/speculation/mds: Clear CPU buffers on exit to user (bsc#1111331).\n- x86/speculation/mds: Conditionally clear CPU buffers on idle entry (bsc#1111331).\n- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1111331).\n- x86/speculation: Rework SMT state change (bsc#1111331).\n- x86/speculation: Simplify the CPU bug detection logic (bsc#1111331).\n- x86/uaccess: Do not leak the AC flag into __put_user() value evaluation (bsc#1114648).\n- xfs: do not BUG() on mixed direct and mapped I/O (bsc#1114920).\n- xfs: fix quotacheck dquot id overflow infinite loop (bsc#1121621).\n- xfs: stop searching for free slots in an inode chunk when there are none (bsc#1115007).\n- xfs: xfs_iget_check_free_state: Use correct sign for errors (bsc#1122015, bsc#1100001).\n- xfs: validate sb_logsunit is a multiple of the fs blocksize (bsc#1115038).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-1289,SUSE-SLE-Module-Public-Cloud-12-2019-1289,SUSE-SLE-SAP-12-SP1-2019-1289,SUSE-SLE-SERVER-12-SP1-2019-1289", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1289-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:1289-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191289-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:1289-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-May/005476.html" }, { "category": "self", "summary": "SUSE Bug 1031240", "url": "https://bugzilla.suse.com/1031240" }, { "category": "self", "summary": "SUSE Bug 1034862", "url": "https://bugzilla.suse.com/1034862" }, { "category": "self", "summary": "SUSE Bug 1066674", "url": "https://bugzilla.suse.com/1066674" }, { "category": "self", "summary": "SUSE Bug 1071021", "url": "https://bugzilla.suse.com/1071021" }, { "category": "self", "summary": "SUSE Bug 1086535", "url": "https://bugzilla.suse.com/1086535" }, { "category": "self", "summary": "SUSE Bug 1091171", "url": "https://bugzilla.suse.com/1091171" }, { "category": "self", "summary": "SUSE Bug 1094825", "url": "https://bugzilla.suse.com/1094825" }, { "category": "self", "summary": "SUSE Bug 1100001", "url": "https://bugzilla.suse.com/1100001" }, { "category": "self", "summary": "SUSE Bug 1102517", "url": "https://bugzilla.suse.com/1102517" }, { "category": "self", "summary": "SUSE Bug 1103097", "url": "https://bugzilla.suse.com/1103097" }, { "category": "self", "summary": "SUSE Bug 1104475", "url": "https://bugzilla.suse.com/1104475" }, { "category": "self", "summary": "SUSE Bug 1105025", "url": "https://bugzilla.suse.com/1105025" }, { "category": "self", "summary": "SUSE Bug 1105296", "url": "https://bugzilla.suse.com/1105296" }, { "category": "self", "summary": "SUSE Bug 1106913", "url": "https://bugzilla.suse.com/1106913" }, { "category": "self", "summary": "SUSE Bug 1107829", "url": "https://bugzilla.suse.com/1107829" }, { "category": "self", "summary": "SUSE Bug 1108498", "url": "https://bugzilla.suse.com/1108498" }, { "category": "self", "summary": "SUSE Bug 1110768", "url": "https://bugzilla.suse.com/1110768" }, { "category": "self", "summary": "SUSE Bug 1111331", "url": "https://bugzilla.suse.com/1111331" }, { "category": "self", "summary": "SUSE Bug 1111516", "url": "https://bugzilla.suse.com/1111516" }, { "category": "self", "summary": "SUSE Bug 1113751", "url": "https://bugzilla.suse.com/1113751" }, { "category": "self", "summary": "SUSE Bug 1113769", "url": "https://bugzilla.suse.com/1113769" }, { "category": "self", "summary": "SUSE Bug 1114648", "url": "https://bugzilla.suse.com/1114648" }, { "category": "self", "summary": "SUSE Bug 1114920", "url": "https://bugzilla.suse.com/1114920" }, { "category": "self", "summary": "SUSE Bug 1115007", "url": "https://bugzilla.suse.com/1115007" }, { "category": "self", "summary": "SUSE Bug 1115038", "url": "https://bugzilla.suse.com/1115038" }, { "category": "self", "summary": "SUSE Bug 1116345", "url": "https://bugzilla.suse.com/1116345" }, { "category": "self", "summary": "SUSE Bug 1116841", "url": "https://bugzilla.suse.com/1116841" }, { "category": "self", "summary": "SUSE Bug 1118152", "url": "https://bugzilla.suse.com/1118152" }, { "category": "self", "summary": "SUSE Bug 1118319", "url": "https://bugzilla.suse.com/1118319" }, { "category": "self", "summary": "SUSE Bug 1119714", "url": "https://bugzilla.suse.com/1119714" }, { "category": "self", "summary": "SUSE Bug 1119946", "url": "https://bugzilla.suse.com/1119946" }, { "category": "self", "summary": "SUSE Bug 1120743", "url": "https://bugzilla.suse.com/1120743" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1121621", "url": "https://bugzilla.suse.com/1121621" }, { "category": "self", "summary": "SUSE Bug 1122015", "url": "https://bugzilla.suse.com/1122015" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1124010", "url": "https://bugzilla.suse.com/1124010" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1126890", "url": "https://bugzilla.suse.com/1126890" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1131416", "url": "https://bugzilla.suse.com/1131416" }, { "category": "self", "summary": "SUSE Bug 1131427", "url": "https://bugzilla.suse.com/1131427" }, { "category": "self", "summary": "SUSE Bug 1132828", "url": "https://bugzilla.suse.com/1132828" }, { "category": "self", "summary": "SUSE Bug 1133188", "url": "https://bugzilla.suse.com/1133188" }, { "category": "self", "summary": "SUSE CVE CVE-2016-10741 page", "url": "https://www.suse.com/security/cve/CVE-2016-10741/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-1000407 page", "url": "https://www.suse.com/security/cve/CVE-2017-1000407/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-16533 page", "url": "https://www.suse.com/security/cve/CVE-2017-16533/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7273 page", "url": "https://www.suse.com/security/cve/CVE-2017-7273/" }, { "category": "self", "summary": "SUSE CVE CVE-2017-7472 page", "url": "https://www.suse.com/security/cve/CVE-2017-7472/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12126 page", "url": "https://www.suse.com/security/cve/CVE-2018-12126/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12127 page", "url": "https://www.suse.com/security/cve/CVE-2018-12127/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-12130 page", "url": "https://www.suse.com/security/cve/CVE-2018-12130/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-14633 page", "url": "https://www.suse.com/security/cve/CVE-2018-14633/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-15572 page", "url": "https://www.suse.com/security/cve/CVE-2018-15572/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-16884 page", "url": "https://www.suse.com/security/cve/CVE-2018-16884/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18281 page", "url": "https://www.suse.com/security/cve/CVE-2018-18281/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18386 page", "url": "https://www.suse.com/security/cve/CVE-2018-18386/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18690 page", "url": "https://www.suse.com/security/cve/CVE-2018-18690/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-18710 page", "url": "https://www.suse.com/security/cve/CVE-2018-18710/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19407 page", "url": "https://www.suse.com/security/cve/CVE-2018-19407/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19824 page", "url": "https://www.suse.com/security/cve/CVE-2018-19824/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-19985 page", "url": "https://www.suse.com/security/cve/CVE-2018-19985/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20169 page", "url": "https://www.suse.com/security/cve/CVE-2018-20169/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-5391 page", "url": "https://www.suse.com/security/cve/CVE-2018-5391/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-9516 page", "url": "https://www.suse.com/security/cve/CVE-2018-9516/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-9568 page", "url": "https://www.suse.com/security/cve/CVE-2018-9568/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11091 page", "url": "https://www.suse.com/security/cve/CVE-2019-11091/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-11486 page", "url": "https://www.suse.com/security/cve/CVE-2019-11486/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3882 page", "url": "https://www.suse.com/security/cve/CVE-2019-3882/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8564 page", "url": "https://www.suse.com/security/cve/CVE-2019-8564/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9503 page", "url": "https://www.suse.com/security/cve/CVE-2019-9503/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-05-28T11:38:31Z", "generator": { "date": "2019-05-28T11:38:31Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:1289-1", "initial_release_date": "2019-05-28T11:38:31Z", "revision_history": [ { "date": "2019-05-28T11:38:31Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-3.12.74-60.64.110.1.noarch", "product": { "name": "kernel-devel-3.12.74-60.64.110.1.noarch", "product_id": "kernel-devel-3.12.74-60.64.110.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-3.12.74-60.64.110.1.noarch", "product": { "name": "kernel-docs-3.12.74-60.64.110.1.noarch", "product_id": "kernel-docs-3.12.74-60.64.110.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-3.12.74-60.64.110.1.noarch", "product": { "name": "kernel-macros-3.12.74-60.64.110.1.noarch", "product_id": "kernel-macros-3.12.74-60.64.110.1.noarch" } }, { "category": "product_version", "name": "kernel-source-3.12.74-60.64.110.1.noarch", "product": { "name": "kernel-source-3.12.74-60.64.110.1.noarch", "product_id": "kernel-source-3.12.74-60.64.110.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-3.12.74-60.64.110.1.noarch", "product": { "name": "kernel-source-vanilla-3.12.74-60.64.110.1.noarch", "product_id": "kernel-source-vanilla-3.12.74-60.64.110.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-3.12.74-60.64.110.1.ppc64le", "product": { "name": "kernel-debug-3.12.74-60.64.110.1.ppc64le", "product_id": "kernel-debug-3.12.74-60.64.110.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-3.12.74-60.64.110.1.ppc64le", "product": { "name": "kernel-debug-base-3.12.74-60.64.110.1.ppc64le", "product_id": "kernel-debug-base-3.12.74-60.64.110.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-3.12.74-60.64.110.1.ppc64le", "product": { "name": "kernel-debug-devel-3.12.74-60.64.110.1.ppc64le", "product_id": "kernel-debug-devel-3.12.74-60.64.110.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-3.12.74-60.64.110.1.ppc64le", "product": { "name": "kernel-debug-extra-3.12.74-60.64.110.1.ppc64le", "product_id": "kernel-debug-extra-3.12.74-60.64.110.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-3.12.74-60.64.110.1.ppc64le", "product": { "name": "kernel-default-3.12.74-60.64.110.1.ppc64le", "product_id": "kernel-default-3.12.74-60.64.110.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.110.1.ppc64le", "product": { "name": "kernel-default-base-3.12.74-60.64.110.1.ppc64le", "product_id": "kernel-default-base-3.12.74-60.64.110.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "product": { "name": "kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "product_id": "kernel-default-devel-3.12.74-60.64.110.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.74-60.64.110.1.ppc64le", "product": { "name": "kernel-default-extra-3.12.74-60.64.110.1.ppc64le", "product_id": "kernel-default-extra-3.12.74-60.64.110.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.110.1.ppc64le", "product": { "name": "kernel-obs-build-3.12.74-60.64.110.1.ppc64le", "product_id": "kernel-obs-build-3.12.74-60.64.110.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-3.12.74-60.64.110.1.ppc64le", "product": { "name": "kernel-obs-qa-3.12.74-60.64.110.1.ppc64le", "product_id": "kernel-obs-qa-3.12.74-60.64.110.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.110.1.ppc64le", "product": { "name": "kernel-syms-3.12.74-60.64.110.1.ppc64le", "product_id": "kernel-syms-3.12.74-60.64.110.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-default-3.12.74-60.64.110.1.s390x", "product": { "name": "kernel-default-3.12.74-60.64.110.1.s390x", "product_id": "kernel-default-3.12.74-60.64.110.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.110.1.s390x", "product": { "name": "kernel-default-base-3.12.74-60.64.110.1.s390x", "product_id": "kernel-default-base-3.12.74-60.64.110.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.110.1.s390x", "product": { "name": "kernel-default-devel-3.12.74-60.64.110.1.s390x", "product_id": "kernel-default-devel-3.12.74-60.64.110.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.74-60.64.110.1.s390x", "product": { "name": "kernel-default-extra-3.12.74-60.64.110.1.s390x", "product_id": "kernel-default-extra-3.12.74-60.64.110.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-3.12.74-60.64.110.1.s390x", "product": { "name": "kernel-default-man-3.12.74-60.64.110.1.s390x", "product_id": "kernel-default-man-3.12.74-60.64.110.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.110.1.s390x", "product": { "name": "kernel-obs-build-3.12.74-60.64.110.1.s390x", "product_id": "kernel-obs-build-3.12.74-60.64.110.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-3.12.74-60.64.110.1.s390x", "product": { "name": "kernel-obs-qa-3.12.74-60.64.110.1.s390x", "product_id": "kernel-obs-qa-3.12.74-60.64.110.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.110.1.s390x", "product": { "name": "kernel-syms-3.12.74-60.64.110.1.s390x", "product_id": "kernel-syms-3.12.74-60.64.110.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-3.12.74-60.64.110.1.s390x", "product": { "name": "kernel-vanilla-3.12.74-60.64.110.1.s390x", "product_id": "kernel-vanilla-3.12.74-60.64.110.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-3.12.74-60.64.110.1.s390x", "product": { "name": "kernel-vanilla-devel-3.12.74-60.64.110.1.s390x", "product_id": "kernel-vanilla-devel-3.12.74-60.64.110.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-3.12.74-60.64.110.1.s390x", "product": { "name": "kernel-zfcpdump-3.12.74-60.64.110.1.s390x", "product_id": "kernel-zfcpdump-3.12.74-60.64.110.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-debug-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-debug-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-debug-base-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-debug-base-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-debug-devel-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-debug-devel-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-debug-extra-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-debug-extra-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-default-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-default-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-default-base-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-default-base-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-default-devel-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-default-devel-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-default-extra-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-default-extra-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-ec2-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-ec2-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-base-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-ec2-base-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-ec2-base-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-ec2-devel-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-ec2-extra-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-obs-build-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-obs-build-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-obs-qa-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-obs-qa-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-syms-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-syms-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-vanilla-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-vanilla-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-vanilla-devel-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-vanilla-devel-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-xen-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-xen-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-base-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-xen-base-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-xen-base-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-xen-devel-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kernel-xen-extra-3.12.74-60.64.110.1.x86_64", "product": { "name": "kernel-xen-extra-3.12.74-60.64.110.1.x86_64", "product_id": "kernel-xen-extra-3.12.74-60.64.110.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "product": { "name": "kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "product_id": "kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-2.7.0-4.4.1.x86_64", "product": { "name": "lttng-modules-2.7.0-4.4.1.x86_64", "product_id": "lttng-modules-2.7.0-4.4.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-kmp-compute-2.7.0_k3.12.49_2-4.4.1.x86_64", "product": { "name": "lttng-modules-kmp-compute-2.7.0_k3.12.49_2-4.4.1.x86_64", "product_id": "lttng-modules-kmp-compute-2.7.0_k3.12.49_2-4.4.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "product": { "name": "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "product_id": "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" } }, { "category": "product_version", "name": "lttng-modules-kmp-rt-2.7.0_k3.12.49_2-4.4.1.x86_64", "product": { "name": "lttng-modules-kmp-rt-2.7.0_k3.12.49_2-4.4.1.x86_64", "product_id": "lttng-modules-kmp-rt-2.7.0_k3.12.49_2-4.4.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:12" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp1" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product": { "name": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS", "product_identification_helper": { "cpe": "cpe:/o:suse:sles-ltss:12:sp1" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-ec2-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-devel-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-ec2-extra-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 12", "product_id": "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.110.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.110.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.110.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.110.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.110.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.110.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.0-4.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64" }, "product_reference": "lttng-modules-2.7.0-4.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP1" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.110.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le" }, "product_reference": "kernel-default-3.12.74-60.64.110.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.110.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x" }, "product_reference": "kernel-default-3.12.74-60.64.110.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-default-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.110.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le" }, "product_reference": "kernel-default-base-3.12.74-60.64.110.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.110.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x" }, "product_reference": "kernel-default-base-3.12.74-60.64.110.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-default-base-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.110.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le" }, "product_reference": "kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.110.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x" }, "product_reference": "kernel-default-devel-3.12.74-60.64.110.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-default-devel-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-3.12.74-60.64.110.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x" }, "product_reference": "kernel-default-man-3.12.74-60.64.110.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-3.12.74-60.64.110.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch" }, "product_reference": "kernel-devel-3.12.74-60.64.110.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-3.12.74-60.64.110.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch" }, "product_reference": "kernel-macros-3.12.74-60.64.110.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-3.12.74-60.64.110.1.noarch as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch" }, "product_reference": "kernel-source-3.12.74-60.64.110.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.110.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le" }, "product_reference": "kernel-syms-3.12.74-60.64.110.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.110.1.s390x as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x" }, "product_reference": "kernel-syms-3.12.74-60.64.110.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-syms-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-xen-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-base-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-xen-base-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-3.12.74-60.64.110.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64" }, "product_reference": "kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64" }, "product_reference": "kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-2.7.0-4.4.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64" }, "product_reference": "lttng-modules-2.7.0-4.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" }, { "category": "default_component_of", "full_product_name": { "name": "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", "product_id": "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" }, "product_reference": "lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP1-LTSS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-10741", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2016-10741" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.9.3, fs/xfs/xfs_aops.c allows local users to cause a denial of service (system crash) because there is a race condition between direct and memory-mapped I/O (associated with a hole) that is handled with BUG_ON instead of an I/O failure.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2016-10741", "url": "https://www.suse.com/security/cve/CVE-2016-10741" }, { "category": "external", "summary": "SUSE Bug 1114920 for CVE-2016-10741", "url": "https://bugzilla.suse.com/1114920" }, { "category": "external", "summary": "SUSE Bug 1124010 for CVE-2016-10741", "url": "https://bugzilla.suse.com/1124010" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2016-10741" }, { "cve": "CVE-2017-1000407", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-1000407" } ], "notes": [ { "category": "general", "text": "The Linux Kernel 2.6.32 and later are affected by a denial of service, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-1000407", "url": "https://www.suse.com/security/cve/CVE-2017-1000407" }, { "category": "external", "summary": "SUSE Bug 1071021 for CVE-2017-1000407", "url": "https://bugzilla.suse.com/1071021" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2017-1000407" }, { "cve": "CVE-2017-16533", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-16533" } ], "notes": [ { "category": "general", "text": "The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel before 4.13.8 allows local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-16533", "url": "https://www.suse.com/security/cve/CVE-2017-16533" }, { "category": "external", "summary": "SUSE Bug 1066674 for CVE-2017-16533", "url": "https://bugzilla.suse.com/1066674" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2017-16533", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1146519 for CVE-2017-16533", "url": "https://bugzilla.suse.com/1146519" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2017-16533" }, { "cve": "CVE-2017-7273", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7273" } ], "notes": [ { "category": "general", "text": "The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 3.2 and 4.x before 4.9.4 allows physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7273", "url": "https://www.suse.com/security/cve/CVE-2017-7273" }, { "category": "external", "summary": "SUSE Bug 1031240 for CVE-2017-7273", "url": "https://bugzilla.suse.com/1031240" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2017-7273" }, { "cve": "CVE-2017-7472", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-7472" } ], "notes": [ { "category": "general", "text": "The KEYS subsystem in the Linux kernel before 4.10.13 allows local users to cause a denial of service (memory consumption) via a series of KEY_REQKEY_DEFL_THREAD_KEYRING keyctl_set_reqkey_keyring calls.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-7472", "url": "https://www.suse.com/security/cve/CVE-2017-7472" }, { "category": "external", "summary": "SUSE Bug 1034862 for CVE-2017-7472", "url": "https://bugzilla.suse.com/1034862" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2017-7472" }, { "cve": "CVE-2018-12126", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12126" } ], "notes": [ { "category": "general", "text": "Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12126", "url": "https://www.suse.com/security/cve/CVE-2018-12126" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1135524 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1135524" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1149725 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149725" }, { "category": "external", "summary": "SUSE Bug 1149726 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149726" }, { "category": "external", "summary": "SUSE Bug 1149729 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1149729" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12126", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2018-12126" }, { "cve": "CVE-2018-12127", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12127" } ], "notes": [ { "category": "general", "text": "Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12127", "url": "https://www.suse.com/security/cve/CVE-2018-12127" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12127", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2018-12127" }, { "cve": "CVE-2018-12130", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-12130" } ], "notes": [ { "category": "general", "text": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-12130", "url": "https://www.suse.com/security/cve/CVE-2018-12130" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1135409 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1135409" }, { "category": "external", "summary": "SUSE Bug 1137916 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1137916" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2018-12130", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2018-12130" }, { "cve": "CVE-2018-14633", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-14633" } ], "notes": [ { "category": "general", "text": "A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target\u0027s code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-14633", "url": "https://www.suse.com/security/cve/CVE-2018-14633" }, { "category": "external", "summary": "SUSE Bug 1107829 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107829" }, { "category": "external", "summary": "SUSE Bug 1107832 for CVE-2018-14633", "url": "https://bugzilla.suse.com/1107832" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "important" } ], "title": "CVE-2018-14633" }, { "cve": "CVE-2018-15572", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-15572" } ], "notes": [ { "category": "general", "text": "The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-15572", "url": "https://www.suse.com/security/cve/CVE-2018-15572" }, { "category": "external", "summary": "SUSE Bug 1102517 for CVE-2018-15572", "url": "https://bugzilla.suse.com/1102517" }, { "category": "external", "summary": "SUSE Bug 1105296 for CVE-2018-15572", "url": "https://bugzilla.suse.com/1105296" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "important" } ], "title": "CVE-2018-15572" }, { "cve": "CVE-2018-16884", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-16884" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-16884", "url": "https://www.suse.com/security/cve/CVE-2018-16884" }, { "category": "external", "summary": "SUSE Bug 1119946 for CVE-2018-16884", "url": "https://bugzilla.suse.com/1119946" }, { "category": "external", "summary": "SUSE Bug 1119947 for CVE-2018-16884", "url": "https://bugzilla.suse.com/1119947" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "important" } ], "title": "CVE-2018-16884" }, { "cve": "CVE-2018-18281", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18281" } ], "notes": [ { "category": "general", "text": "Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18281", "url": "https://www.suse.com/security/cve/CVE-2018-18281" }, { "category": "external", "summary": "SUSE Bug 1113769 for CVE-2018-18281", "url": "https://bugzilla.suse.com/1113769" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2018-18281" }, { "cve": "CVE-2018-18386", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18386" } ], "notes": [ { "category": "general", "text": "drivers/tty/n_tty.c in the Linux kernel before 4.14.11 allows local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18386", "url": "https://www.suse.com/security/cve/CVE-2018-18386" }, { "category": "external", "summary": "SUSE Bug 1094825 for CVE-2018-18386", "url": "https://bugzilla.suse.com/1094825" }, { "category": "external", "summary": "SUSE Bug 1112039 for CVE-2018-18386", "url": "https://bugzilla.suse.com/1112039" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2018-18386" }, { "cve": "CVE-2018-18690", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18690" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18690", "url": "https://www.suse.com/security/cve/CVE-2018-18690" }, { "category": "external", "summary": "SUSE Bug 1105025 for CVE-2018-18690", "url": "https://bugzilla.suse.com/1105025" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2018-18690" }, { "cve": "CVE-2018-18710", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-18710" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-18710", "url": "https://www.suse.com/security/cve/CVE-2018-18710" }, { "category": "external", "summary": "SUSE Bug 1113751 for CVE-2018-18710", "url": "https://bugzilla.suse.com/1113751" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2018-18710" }, { "cve": "CVE-2018-19407", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19407" } ], "notes": [ { "category": "general", "text": "The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19407", "url": "https://www.suse.com/security/cve/CVE-2018-19407" }, { "category": "external", "summary": "SUSE Bug 1116841 for CVE-2018-19407", "url": "https://bugzilla.suse.com/1116841" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2018-19407" }, { "cve": "CVE-2018-19824", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19824" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19824", "url": "https://www.suse.com/security/cve/CVE-2018-19824" }, { "category": "external", "summary": "SUSE Bug 1118152 for CVE-2018-19824", "url": "https://bugzilla.suse.com/1118152" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2018-19824" }, { "cve": "CVE-2018-19985", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-19985" } ], "notes": [ { "category": "general", "text": "The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-19985", "url": "https://www.suse.com/security/cve/CVE-2018-19985" }, { "category": "external", "summary": "SUSE Bug 1120743 for CVE-2018-19985", "url": "https://bugzilla.suse.com/1120743" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "low" } ], "title": "CVE-2018-19985" }, { "cve": "CVE-2018-20169", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20169" } ], "notes": [ { "category": "general", "text": "An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20169", "url": "https://www.suse.com/security/cve/CVE-2018-20169" }, { "category": "external", "summary": "SUSE Bug 1119714 for CVE-2018-20169", "url": "https://bugzilla.suse.com/1119714" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2018-20169" }, { "cve": "CVE-2018-5391", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-5391" } ], "notes": [ { "category": "general", "text": "The Linux kernel, versions 3.9+, is vulnerable to a denial of service attack with low rates of specially modified packets targeting IP fragment re-assembly. An attacker may cause a denial of service condition by sending specially crafted IP fragments. Various vulnerabilities in IP fragmentation have been discovered and fixed over the years. The current vulnerability (CVE-2018-5391) became exploitable in the Linux kernel with the increase of the IP fragment reassembly queue size.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-5391", "url": "https://www.suse.com/security/cve/CVE-2018-5391" }, { "category": "external", "summary": "SUSE Bug 1087082 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1087082" }, { "category": "external", "summary": "SUSE Bug 1102340 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1102340" }, { "category": "external", "summary": "SUSE Bug 1103097 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103097" }, { "category": "external", "summary": "SUSE Bug 1103098 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1103098" }, { "category": "external", "summary": "SUSE Bug 1108654 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1108654" }, { "category": "external", "summary": "SUSE Bug 1114071 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1114071" }, { "category": "external", "summary": "SUSE Bug 1121102 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1121102" }, { "category": "external", "summary": "SUSE Bug 1134140 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1134140" }, { "category": "external", "summary": "SUSE Bug 1181460 for CVE-2018-5391", "url": "https://bugzilla.suse.com/1181460" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "important" } ], "title": "CVE-2018-5391" }, { "cve": "CVE-2018-9516", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-9516" } ], "notes": [ { "category": "general", "text": "In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-71361580.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-9516", "url": "https://www.suse.com/security/cve/CVE-2018-9516" }, { "category": "external", "summary": "SUSE Bug 1108498 for CVE-2018-9516", "url": "https://bugzilla.suse.com/1108498" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2018-9516", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2018-9516" }, { "cve": "CVE-2018-9568", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-9568" } ], "notes": [ { "category": "general", "text": "In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-9568", "url": "https://www.suse.com/security/cve/CVE-2018-9568" }, { "category": "external", "summary": "SUSE Bug 1118319 for CVE-2018-9568", "url": "https://bugzilla.suse.com/1118319" }, { "category": "external", "summary": "SUSE Bug 1118320 for CVE-2018-9568", "url": "https://bugzilla.suse.com/1118320" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "important" } ], "title": "CVE-2018-9568" }, { "cve": "CVE-2019-11091", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11091" } ], "notes": [ { "category": "general", "text": "Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11091", "url": "https://www.suse.com/security/cve/CVE-2019-11091" }, { "category": "external", "summary": "SUSE Bug 1103186 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1103186" }, { "category": "external", "summary": "SUSE Bug 1111331 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1111331" }, { "category": "external", "summary": "SUSE Bug 1132686 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1132686" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1133319" }, { "category": "external", "summary": "SUSE Bug 1135394 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1135394" }, { "category": "external", "summary": "SUSE Bug 1138043 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1138043" }, { "category": "external", "summary": "SUSE Bug 1138534 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1138534" }, { "category": "external", "summary": "SUSE Bug 1141977 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1141977" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2019-11091", "url": "https://bugzilla.suse.com/1201877" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2019-11091" }, { "cve": "CVE-2019-11486", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-11486" } ], "notes": [ { "category": "general", "text": "The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-11486", "url": "https://www.suse.com/security/cve/CVE-2019-11486" }, { "category": "external", "summary": "SUSE Bug 1133188 for CVE-2019-11486", "url": "https://bugzilla.suse.com/1133188" }, { "category": "external", "summary": "SUSE Bug 1156434 for CVE-2019-11486", "url": "https://bugzilla.suse.com/1156434" }, { "category": "external", "summary": "SUSE Bug 1173667 for CVE-2019-11486", "url": "https://bugzilla.suse.com/1173667" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2019-11486" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-3882", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3882" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3882", "url": "https://www.suse.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "SUSE Bug 1131416 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131416" }, { "category": "external", "summary": "SUSE Bug 1131427 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1131427" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-3882", "url": "https://bugzilla.suse.com/1133319" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2019-3882" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "important" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "important" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-8564", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8564" } ], "notes": [ { "category": "general", "text": "A logic issue was addressed with improved validation. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position can modify driver state.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8564", "url": "https://www.suse.com/security/cve/CVE-2019-8564" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-8564", "url": "https://bugzilla.suse.com/1132828" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2019-8564" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2019-9213" }, { "cve": "CVE-2019-9503", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9503" } ], "notes": [ { "category": "general", "text": "The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9503", "url": "https://www.suse.com/security/cve/CVE-2019-9503" }, { "category": "external", "summary": "SUSE Bug 1132673 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1132673" }, { "category": "external", "summary": "SUSE Bug 1132828 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1132828" }, { "category": "external", "summary": "SUSE Bug 1133319 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1133319" }, { "category": "external", "summary": "SUSE Bug 1156653 for CVE-2019-9503", "url": "https://bugzilla.suse.com/1156653" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 12:kernel-ec2-extra-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-default-man-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.ppc64le", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.s390x", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-default-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-devel-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-macros-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-source-3.12.74-60.64.110.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-syms-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-base-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kernel-xen-devel-3.12.74-60.64.110.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-default-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:kgraft-patch-3_12_74-60_64_110-xen-1-2.3.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-2.7.0-4.4.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:lttng-modules-kmp-default-2.7.0_k3.12.74_60.64.110-4.4.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-05-28T11:38:31Z", "details": "moderate" } ], "title": "CVE-2019-9503" } ] }
rhsa-2020:0740
Vulnerability from csaf_redhat
Published
2020-03-09 14:35
Modified
2024-11-22 14:25
Summary
Red Hat Security Advisory: kernel-alt security and bug fix update
Notes
Topic
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel-alt packages provide the Linux kernel version 4.x.
Security Fix(es):
* kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow (CVE-2019-17666)
* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)
* kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459)
* kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460)
* kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command (CVE-2019-11884)
* kernel: powerpc: local user can read vector registers of other users' processes via a Facility Unavailable exception (CVE-2019-15030)
* kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service (CVE-2019-15916)
* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* lpfc: NVMe/FC target test machine rhel-storage-62 crashes on boot when connected to FC switch (BZ#1623205)
* kernel BUG at fs/nfs_common/grace.c:107! (BZ#1637543)
* RHEL-Alt-7.6 - Need a fix for kernel bug cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias() (BZ#1711934)
* Backport "fs/dcache.c: add cond_resched() in shrink_dentry_list()" (32785c0539b7) [rhel-alt-7.6.z] (BZ#1758861)
* [RHEL-ALT-7.6.z][arm64] iommu/iova: Fix tracking of recently failed iova address (BZ#1780500)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel-alt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-alt packages provide the Linux kernel version 4.x.\n\nSecurity Fix(es):\n\n* kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow (CVE-2019-17666)\n\n* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871)\n\n* kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459)\n\n* kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460)\n\n* kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command (CVE-2019-11884)\n\n* kernel: powerpc: local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception (CVE-2019-15030)\n\n* kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service (CVE-2019-15916)\n\n* kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c (CVE-2019-18805)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* lpfc: NVMe/FC target test machine rhel-storage-62 crashes on boot when connected to FC switch (BZ#1623205)\n\n* kernel BUG at fs/nfs_common/grace.c:107! (BZ#1637543)\n\n* RHEL-Alt-7.6 - Need a fix for kernel bug cap_inode_getsecurity: use d_find_any_alias() instead of d_find_alias() (BZ#1711934)\n\n* Backport \"fs/dcache.c: add cond_resched() in shrink_dentry_list()\" (32785c0539b7) [rhel-alt-7.6.z] (BZ#1758861)\n\n* [RHEL-ALT-7.6.z][arm64] iommu/iova: Fix tracking of recently failed iova address (BZ#1780500)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:0740", "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "1663176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176" }, { "category": "external", "summary": "1663179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663179" }, { "category": "external", "summary": "1709837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709837" }, { "category": "external", "summary": "1750813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750813" }, { "category": "external", "summary": "1759313", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759313" }, { "category": "external", "summary": "1763690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763690" }, { "category": "external", "summary": "1771496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_0740.json" } ], "title": "Red Hat Security Advisory: kernel-alt security and bug fix update", "tracking": { "current_release_date": "2024-11-22T14:25:36+00:00", "generator": { "date": "2024-11-22T14:25:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:0740", "initial_release_date": "2020-03-09T14:35:10+00:00", "revision_history": [ { "date": "2020-03-09T14:35:10+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-03-09T14:35:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T14:25:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "perf-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "perf-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python-perf-debuginfo@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.14.0-115.18.1.el7a?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.14.0-115.18.1.el7a?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "product": { "name": "kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "product_id": "kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.14.0-115.18.1.el7a?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "product": { "name": "kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "product_id": "kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.14.0-115.18.1.el7a?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-alt-0:4.14.0-115.18.1.el7a.src", "product": { "name": "kernel-alt-0:4.14.0-115.18.1.el7a.src", "product_id": "kernel-alt-0:4.14.0-115.18.1.el7a.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-alt@4.14.0-115.18.1.el7a?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-115.18.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-115.18.1.el7a.src", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-115.18.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7)", "product_id": "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-alt-0:4.14.0-115.18.1.el7a.src as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src" }, "product_reference": "kernel-alt-0:4.14.0-115.18.1.el7a.src", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.14.0-115.18.1.el7a.noarch as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch" }, "product_reference": "kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "perf-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" }, { "category": "default_component_of", "full_product_name": { "name": "python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le as a component of Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7)", "product_id": "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" }, "product_reference": "python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "relates_to_product_reference": "7Server-optional-RHELALT-7.6" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Hangbin Liu" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." }, { "names": [ "Jasu Liedes" ], "organization": "Synopsys SIG" } ], "cve": "CVE-2018-16871", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2018-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1655162" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS implementation. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16871" }, { "category": "external", "summary": "RHBZ#1655162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1655162" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16871", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16871" } ], "release_date": "2019-06-03T02:23:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence" }, { "cve": "CVE-2019-3459", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-01-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1663176" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of Logical Link Control and Adaptation Protocol (L2CAP), part of the Bluetooth stack. An attacker, within the range of standard Bluetooth transmissions, can create and send a specially crafted packet. The response to this specially crafted packet can contain part of the kernel stack which can be used in a further attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Heap address information leak while using L2CAP_GET_CONF_OPT", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "RHBZ#1663176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3459", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3459" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459" } ], "release_date": "2019-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "category": "workaround", "details": "- Disabling the bluetooth hardware in the bios.\n- Prevent loading of the bluetooth kernel modules.\n- Disable the bluetooth connection by putting the system in \"airport\" mode.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Heap address information leak while using L2CAP_GET_CONF_OPT" }, { "cve": "CVE-2019-3460", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-01-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1663179" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_parse_conf_rsp and l2cap_parse_conf_req functions. An attacker with physical access within the range of standard Bluetooth transmission can create a specially crafted packet. The response to this specially crafted packet can contain part of the kernel stack which can be used in a further attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "RHBZ#1663179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663179" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3460", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3460" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460" } ], "release_date": "2019-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "category": "workaround", "details": "- Disabling the bluetooth hardware in the bios.\n- Prevent loading of the bluetooth kernel modules.\n- Disable the bluetooth connection by putting the system in \"airport\" mode.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP" }, { "cve": "CVE-2019-11884", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-05-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1709837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of the Bluetooth Human Interface Device Protocol (HIDP). A local attacker with access permissions to the Bluetooth device can issue an IOCTL which will trigger the do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c.c. This function can leak potentially sensitive information from the kernel stack memory via a HIDPCONNADD command because a name field may not be correctly NULL terminated.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11884" }, { "category": "external", "summary": "RHBZ#1709837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11884", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11884" } ], "release_date": "2019-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command" }, { "cve": "CVE-2019-15030", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-10-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1759313" } ], "notes": [ { "category": "description", "text": "A flaw in the Linux kernel on the PowerPC platform, was found where a local user can read vector registers of other user processes (via a Facility Unavailable exception). An attacker must start a transaction when the FPU operation begins or there is no leakage. Vector registers will become corrupted with values from the different local Linux processes, because of the missing check inside arch/powerpc/kernel/process.c. The highest threat from this vulnerability is confidentiality of data and availability of the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: powerpc: local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15030" }, { "category": "external", "summary": "RHBZ#1759313", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1759313" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15030", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15030" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15030", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15030" } ], "release_date": "2019-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "category": "workaround", "details": "When applicable rely on FPU emulation (for example by rebuilding the critical services code) instead of the hardware FPU.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: powerpc: local user can read vector registers of other users\u0027 processes via a Facility Unavailable exception" }, { "cve": "CVE-2019-15916", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-09-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1750813" } ], "notes": [ { "category": "description", "text": "A flaw that allowed an attacker to leak kernel memory was found in the network subsystem where an attacker with permissions to create tun/tap devices can create a denial of service and panic the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-15916" }, { "category": "external", "summary": "RHBZ#1750813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-15916", "url": "https://www.cve.org/CVERecord?id=CVE-2019-15916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-15916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-15916" } ], "release_date": "2019-09-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service" }, { "cve": "CVE-2019-17666", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2019-10-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1763690" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of the RealTek wireless drivers WiFi-direct (or WiFi peer-to-peer) driver implementation. When the RealTek wireless networking hardware is configured to accept WiFi-Direct or WiFi P2P connections, an attacker within the wireless network connectivity radio range can exploit a flaw in the WiFi-direct protocol known as \"Notice of Absence\" by creating specially crafted frames which can then corrupt kernel memory as the upper bounds on the length of the frame is unchecked and supplied by the incoming packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-17666" }, { "category": "external", "summary": "RHBZ#1763690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1763690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-17666", "url": "https://www.cve.org/CVERecord?id=CVE-2019-17666" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-17666", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-17666" }, { "category": "external", "summary": "https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/", "url": "https://arstechnica.com/information-technology/2019/10/unpatched-linux-flaw-may-let-attackers-crash-or-compromise-nearby-devices/" }, { "category": "external", "summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c55dedb795be8ec0cf488f98c03a1c2176f7fb1", "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c55dedb795be8ec0cf488f98c03a1c2176f7fb1" } ], "release_date": "2019-10-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow" }, { "cve": "CVE-2019-18805", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2019-11-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1771496" } ], "notes": [ { "category": "description", "text": "A flaw was reported in the Linux kernel\u0027s TCP subsystem while calculating a packet round trip time, when a sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) is set incorrectly. This causes an integer overflow which can lead to a denial Of service (DOS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-18805" }, { "category": "external", "summary": "RHBZ#1771496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1771496" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-18805", "url": "https://www.cve.org/CVERecord?id=CVE-2019-18805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18805" } ], "release_date": "2019-04-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-03-09T14:35:10+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:0740" }, { "category": "workaround", "details": "This flaw can be mitigated by setting the sysctl parameter (/proc/sys/net/ipv4/tcp_min_rtt_wlen) with 300 which means the packet time will not exceed more then 5 minutes and which should not cause an integer overflow.", "product_ids": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H", "version": "3.0" }, "products": [ "7Server-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-abi-whitelists-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-alt-0:4.14.0-115.18.1.el7a.src", "7Server-optional-RHELALT-7.6:kernel-bootwrapper-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debug-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-debuginfo-common-ppc64le-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-doc-0:4.14.0-115.18.1.el7a.noarch", "7Server-optional-RHELALT-7.6:kernel-headers-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:kernel-tools-libs-devel-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-0:4.14.0-115.18.1.el7a.ppc64le", "7Server-optional-RHELALT-7.6:python-perf-debuginfo-0:4.14.0-115.18.1.el7a.ppc64le" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: integer overflow in tcp_ack_update_rtt in net/ipv4/tcp_input.c" } ] }
rhsa-2019_3517
Vulnerability from csaf_redhat
Published
2019-11-05 20:56
Modified
2024-11-22 12:50
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
An update for kernel is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)
* Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)
* Kernel: page cache side channel attacks (CVE-2019-5489)
* hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)
* kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)
* Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)
* kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c (CVE-2018-19854)
* kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS (CVE-2018-20169)
* kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459)
* kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460)
* kernel: SCTP socket buffer memory leak leading to denial of service (CVE-2019-3874)
* kernel: denial of service vector through vfio DMA mappings (CVE-2019-3882)
* kernel: null-pointer dereference in hci_uart_set_flow_control (CVE-2019-10207)
* kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (CVE-2019-11599)
* kernel: fs/ext4/extents.c leads to information disclosure (CVE-2019-11833)
* kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command (CVE-2019-11884)
* kernel: use-after-free in arch/x86/lib/insn-eval.c (CVE-2019-13233)
* kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service (CVE-2019-15916)
* kernel: Linux stack ASLR implementation Integer overflow (CVE-2015-1593)
* kernel: oob memory read in hso_probe in drivers/net/usb/hso.c (CVE-2018-19985)
* Kernel: KVM: leak of uninitialized stack contents to guest (CVE-2019-7222)
* Kernel: net: weak IP ID generation leads to remote device tracking (CVE-2019-10638)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884)\n\n* Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900)\n\n* Kernel: page cache side channel attacks (CVE-2019-5489)\n\n* hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506)\n\n* kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)\n\n* Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821)\n\n* kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c (CVE-2018-19854)\n\n* kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS (CVE-2018-20169)\n\n* kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459)\n\n* kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460)\n\n* kernel: SCTP socket buffer memory leak leading to denial of service (CVE-2019-3874)\n\n* kernel: denial of service vector through vfio DMA mappings (CVE-2019-3882)\n\n* kernel: null-pointer dereference in hci_uart_set_flow_control (CVE-2019-10207)\n\n* kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (CVE-2019-11599)\n\n* kernel: fs/ext4/extents.c leads to information disclosure (CVE-2019-11833)\n\n* kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command (CVE-2019-11884)\n\n* kernel: use-after-free in arch/x86/lib/insn-eval.c (CVE-2019-13233)\n\n* kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service (CVE-2019-15916)\n\n* kernel: Linux stack ASLR implementation Integer overflow (CVE-2015-1593)\n\n* kernel: oob memory read in hso_probe in drivers/net/usb/hso.c (CVE-2018-19985)\n\n* Kernel: KVM: leak of uninitialized stack contents to guest (CVE-2019-7222)\n\n* Kernel: net: weak IP ID generation leads to remote device tracking (CVE-2019-10638)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.1 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2019:3517", "url": "https://access.redhat.com/errata/RHSA-2019:3517" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.1_release_notes/" }, { "category": "external", "summary": "1192519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192519" }, { "category": "external", "summary": "1656432", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656432" }, { "category": "external", "summary": "1656986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656986" }, { "category": "external", "summary": "1660375", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375" }, { "category": "external", "summary": "1660385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660385" }, { "category": "external", "summary": "1663176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176" }, { "category": "external", "summary": "1663179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663179" }, { "category": "external", "summary": "1664110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664110" }, { "category": "external", "summary": "1666106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666106" }, { "category": "external", "summary": "1671930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671930" }, { "category": "external", "summary": "1686373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686373" }, { "category": "external", "summary": "1689426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1689426" }, { "category": "external", "summary": "1694143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1694143" }, { "category": "external", "summary": "1698757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757" }, { "category": "external", "summary": "1705937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705937" }, { "category": "external", "summary": "1709837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709837" }, { "category": "external", "summary": "1712072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712072" }, { "category": "external", "summary": "1712197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712197" }, { "category": "external", "summary": "1716992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716992" }, { "category": "external", "summary": "1719067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719067" }, { "category": "external", "summary": "1721034", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1721034" }, { "category": "external", "summary": "1727756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727756" }, { "category": "external", "summary": "1727857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727857" }, { "category": "external", "summary": "1729931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729931" }, { "category": "external", "summary": "1733874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733874" }, { "category": "external", "summary": "1746708", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1746708" }, { "category": "external", "summary": "1750813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1750813" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2019/rhsa-2019_3517.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T12:50:36+00:00", "generator": { "date": "2024-11-22T12:50:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2019:3517", "initial_release_date": "2019-11-05T20:56:57+00:00", "revision_history": [ { "date": "2019-11-05T20:56:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-11-05T20:56:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T12:50:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "product_id": "kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "product_id": "bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-debuginfo-0:4.18.0-147.el8.aarch64", "product_id": "kernel-debuginfo-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.el8.aarch64", "product": { "name": "perf-debuginfo-0:4.18.0-147.el8.aarch64", "product_id": "perf-debuginfo-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "product_id": "python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-147.el8.aarch64", "product": { "name": "bpftool-0:4.18.0-147.el8.aarch64", "product_id": "bpftool-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-0:4.18.0-147.el8.aarch64", "product_id": "kernel-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-core-0:4.18.0-147.el8.aarch64", "product_id": "kernel-core-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-cross-headers-0:4.18.0-147.el8.aarch64", "product_id": "kernel-cross-headers-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-debug-0:4.18.0-147.el8.aarch64", "product_id": "kernel-debug-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-debug-core-0:4.18.0-147.el8.aarch64", "product_id": "kernel-debug-core-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-debug-devel-0:4.18.0-147.el8.aarch64", "product_id": "kernel-debug-devel-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-debug-modules-0:4.18.0-147.el8.aarch64", "product_id": "kernel-debug-modules-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-devel-0:4.18.0-147.el8.aarch64", "product_id": "kernel-devel-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-headers-0:4.18.0-147.el8.aarch64", "product_id": "kernel-headers-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-modules-0:4.18.0-147.el8.aarch64", "product_id": "kernel-modules-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-modules-extra-0:4.18.0-147.el8.aarch64", "product_id": "kernel-modules-extra-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-tools-0:4.18.0-147.el8.aarch64", "product_id": "kernel-tools-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.el8.aarch64", "product": { "name": "kernel-tools-libs-0:4.18.0-147.el8.aarch64", "product_id": "kernel-tools-libs-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.el8.aarch64", "product": { "name": "perf-0:4.18.0-147.el8.aarch64", "product_id": "perf-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.el8?arch=aarch64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.el8.aarch64", "product": { "name": "python3-perf-0:4.18.0-147.el8.aarch64", "product_id": "python3-perf-0:4.18.0-147.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "product_id": "bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.el8.ppc64le", "product": { "name": "perf-debuginfo-0:4.18.0-147.el8.ppc64le", "product_id": "perf-debuginfo-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "product_id": "python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-147.el8.ppc64le", "product": { "name": "bpftool-0:4.18.0-147.el8.ppc64le", "product_id": "bpftool-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-core-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-core-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-debug-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-debug-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-debug-core-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-debug-core-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-devel-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-devel-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-headers-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-headers-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-modules-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-modules-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-tools-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-tools-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "product": { "name": "kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "product_id": "kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.el8.ppc64le", "product": { "name": "perf-0:4.18.0-147.el8.ppc64le", "product_id": "perf-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.el8.ppc64le", "product": { "name": "python3-perf-0:4.18.0-147.el8.ppc64le", "product_id": "python3-perf-0:4.18.0-147.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "product_id": "kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "product_id": "bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-debuginfo-0:4.18.0-147.el8.x86_64", "product_id": "kernel-debuginfo-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.el8.x86_64", "product": { "name": "perf-debuginfo-0:4.18.0-147.el8.x86_64", "product_id": "perf-debuginfo-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "product_id": "python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "bpftool-0:4.18.0-147.el8.x86_64", "product": { "name": "bpftool-0:4.18.0-147.el8.x86_64", "product_id": "bpftool-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-0:4.18.0-147.el8.x86_64", "product_id": "kernel-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-core-0:4.18.0-147.el8.x86_64", "product_id": "kernel-core-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-cross-headers-0:4.18.0-147.el8.x86_64", "product_id": "kernel-cross-headers-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-debug-0:4.18.0-147.el8.x86_64", "product_id": "kernel-debug-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-debug-core-0:4.18.0-147.el8.x86_64", "product_id": "kernel-debug-core-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-debug-devel-0:4.18.0-147.el8.x86_64", "product_id": "kernel-debug-devel-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-debug-modules-0:4.18.0-147.el8.x86_64", "product_id": "kernel-debug-modules-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-devel-0:4.18.0-147.el8.x86_64", "product_id": "kernel-devel-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-headers-0:4.18.0-147.el8.x86_64", "product_id": "kernel-headers-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-modules-0:4.18.0-147.el8.x86_64", "product_id": "kernel-modules-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-modules-extra-0:4.18.0-147.el8.x86_64", "product_id": "kernel-modules-extra-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-tools-0:4.18.0-147.el8.x86_64", "product_id": "kernel-tools-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-tools-libs-0:4.18.0-147.el8.x86_64", "product": { "name": "kernel-tools-libs-0:4.18.0-147.el8.x86_64", "product_id": "kernel-tools-libs-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.el8.x86_64", "product": { "name": "perf-0:4.18.0-147.el8.x86_64", "product_id": "perf-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.el8?arch=x86_64" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.el8.x86_64", "product": { "name": "python3-perf-0:4.18.0-147.el8.x86_64", "product_id": "python3-perf-0:4.18.0-147.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "bpftool-0:4.18.0-147.el8.s390x", "product": { "name": "bpftool-0:4.18.0-147.el8.s390x", "product_id": "bpftool-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-0:4.18.0-147.el8.s390x", "product_id": "kernel-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-core-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-core-0:4.18.0-147.el8.s390x", "product_id": "kernel-core-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-core@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-cross-headers-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-cross-headers-0:4.18.0-147.el8.s390x", "product_id": "kernel-cross-headers-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-debug-0:4.18.0-147.el8.s390x", "product_id": "kernel-debug-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-core-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-debug-core-0:4.18.0-147.el8.s390x", "product_id": "kernel-debug-core-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-debug-devel-0:4.18.0-147.el8.s390x", "product_id": "kernel-debug-devel-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-debug-modules-0:4.18.0-147.el8.s390x", "product_id": "kernel-debug-modules-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "product_id": "kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-devel-0:4.18.0-147.el8.s390x", "product_id": "kernel-devel-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-headers-0:4.18.0-147.el8.s390x", "product_id": "kernel-headers-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-modules-0:4.18.0-147.el8.s390x", "product_id": "kernel-modules-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-modules-extra-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-modules-extra-0:4.18.0-147.el8.s390x", "product_id": "kernel-modules-extra-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-tools-0:4.18.0-147.el8.s390x", "product_id": "kernel-tools-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-zfcpdump-0:4.18.0-147.el8.s390x", "product_id": "kernel-zfcpdump-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "product_id": "kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "product_id": "kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "product_id": "kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-0:4.18.0-147.el8.s390x", "product": { "name": "perf-0:4.18.0-147.el8.s390x", "product_id": "perf-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-0:4.18.0-147.el8.s390x", "product": { "name": "python3-perf-0:4.18.0-147.el8.s390x", "product_id": "python3-perf-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "bpftool-debuginfo-0:4.18.0-147.el8.s390x", "product": { "name": "bpftool-debuginfo-0:4.18.0-147.el8.s390x", "product_id": "bpftool-debuginfo-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "product_id": "kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-debuginfo-0:4.18.0-147.el8.s390x", "product_id": "kernel-debuginfo-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "product_id": "kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "product_id": "kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "product": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "perf-debuginfo-0:4.18.0-147.el8.s390x", "product": { "name": "perf-debuginfo-0:4.18.0-147.el8.s390x", "product_id": "perf-debuginfo-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-147.el8?arch=s390x" } } }, { "category": "product_version", "name": "python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "product": { "name": "python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "product_id": "python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-147.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:4.18.0-147.el8.src", "product": { "name": "kernel-0:4.18.0-147.el8.src", "product_id": "kernel-0:4.18.0-147.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@4.18.0-147.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "product": { "name": "kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "product_id": "kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-abi-whitelists@4.18.0-147.el8?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:4.18.0-147.el8.noarch", "product": { "name": "kernel-doc-0:4.18.0-147.el8.noarch", "product_id": "kernel-doc-0:4.18.0-147.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@4.18.0-147.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src" }, "product_reference": "kernel-0:4.18.0-147.el8.src", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-147.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-147.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-147.el8.noarch", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64" }, "product_reference": "perf-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x" }, "product_reference": "perf-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64" }, "product_reference": "perf-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "BaseOS-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64" }, "product_reference": "bpftool-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le" }, "product_reference": "bpftool-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x" }, "product_reference": "bpftool-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64" }, "product_reference": "bpftool-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "bpftool-debuginfo-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64" }, "product_reference": "bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-0:4.18.0-147.el8.src" }, "product_reference": "kernel-0:4.18.0-147.el8.src", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-abi-whitelists-0:4.18.0-147.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch" }, "product_reference": "kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-core-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-core-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-core-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-core-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-core-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-cross-headers-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-cross-headers-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debug-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debug-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debug-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debug-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debug-core-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debug-core-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-core-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debug-core-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debug-devel-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debug-modules-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debuginfo-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-devel-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-devel-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-devel-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-devel-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:4.18.0-147.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch" }, "product_reference": "kernel-doc-0:4.18.0-147.el8.noarch", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-headers-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-headers-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-headers-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-headers-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-modules-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-modules-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-modules-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-modules-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-modules-extra-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-modules-extra-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-tools-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-tools-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-tools-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-tools-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-tools-libs-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64" }, "product_reference": "kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-zfcpdump-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-core-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x" }, "product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64" }, "product_reference": "perf-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le" }, "product_reference": "perf-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x" }, "product_reference": "perf-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64" }, "product_reference": "perf-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le" }, "product_reference": "perf-debuginfo-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x" }, "product_reference": "perf-debuginfo-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64" }, "product_reference": "perf-debuginfo-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64" }, "product_reference": "python3-perf-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le" }, "product_reference": "python3-perf-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x" }, "product_reference": "python3-perf-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64" }, "product_reference": "python3-perf-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "relates_to_product_reference": "CRB-8.1.0" }, { "category": "default_component_of", "full_product_name": { "name": "python3-perf-debuginfo-0:4.18.0-147.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" }, "product_reference": "python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "relates_to_product_reference": "CRB-8.1.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-1593", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2015-02-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1192519" } ], "notes": [ { "category": "description", "text": "An integer overflow flaw was found in the way the Linux kernel randomized the stack for processes on certain 64-bit architecture systems, such as x86-64, causing the stack entropy to be reduced by four.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Linux stack ASLR implementation Integer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does affect the Linux kernel versions as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates in the respective releases may address this issue.\n\nThis issue does affect the Linux kernel versions as shipped with Red Hat Enterprise Linux 5. Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-1593" }, { "category": "external", "summary": "RHBZ#1192519", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1192519" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-1593", "url": "https://www.cve.org/CVERecord?id=CVE-2015-1593" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-1593", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1593" } ], "release_date": "2015-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: Linux stack ASLR implementation Integer overflow" }, { "acknowledgments": [ { "names": [ "Evgenii Shatokhin", "Vasily Averin" ], "organization": "Virtuozzo" } ], "cve": "CVE-2018-16884", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2018-12-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1660375" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nfs: use-after-free in svc_process_common()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-16884" }, { "category": "external", "summary": "RHBZ#1660375", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660375" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-16884", "url": "https://www.cve.org/CVERecord?id=CVE-2018-16884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-16884" } ], "release_date": "2018-11-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nfs: use-after-free in svc_process_common()" }, { "cve": "CVE-2018-19854", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2018-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1656986" } ], "notes": [ { "category": "description", "text": "An issue was discovered in the Linux kernel in the crypto_report_one() and related functions in the crypto/crypto_user.c (the crypto user configuration API) which do not fully initialize structures that are copied to userspace, potentially leaking sensitive kernel memory content to a userspace.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19854" }, { "category": "external", "summary": "RHBZ#1656986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1656986" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19854", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19854" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19854", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19854" } ], "release_date": "2018-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Information Disclosure in crypto_report_one in crypto/crypto_user.c" }, { "cve": "CVE-2018-19985", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2019-01-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1666106" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel in the function hso_probe() which reads if_num value from the USB device (as an u8) and uses it without a length check to index an array, resulting in an OOB memory read in hso_probe() or hso_get_config_data(). An attacker with a forged USB device and physical access to a system (needed to connect such a device) can cause a system crash and a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: oob memory read in hso_probe in drivers/net/usb/hso.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-19985" }, { "category": "external", "summary": "RHBZ#1666106", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1666106" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-19985", "url": "https://www.cve.org/CVERecord?id=CVE-2018-19985" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-19985", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-19985" } ], "release_date": "2018-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: oob memory read in hso_probe in drivers/net/usb/hso.c" }, { "cve": "CVE-2018-20169", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2018-12-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1660385" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in the Linux kernel\u0027s USB subsystem in the __usb_get_extra_descriptor() function in the drivers/usb/core/usb.c which mishandles a size check during the reading of an extra descriptor data. By using a specially crafted USB device which sends a forged extra descriptor, an unprivileged user with physical access to the system can potentially cause a privilege escalation or trigger a system crash or lock up and thus to cause a denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-20169" }, { "category": "external", "summary": "RHBZ#1660385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1660385" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-20169", "url": "https://www.cve.org/CVERecord?id=CVE-2018-20169" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-20169", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-20169" } ], "release_date": "2018-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS" }, { "cve": "CVE-2019-3459", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-01-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1663176" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of Logical Link Control and Adaptation Protocol (L2CAP), part of the Bluetooth stack. An attacker, within the range of standard Bluetooth transmissions, can create and send a specially crafted packet. The response to this specially crafted packet can contain part of the kernel stack which can be used in a further attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Heap address information leak while using L2CAP_GET_CONF_OPT", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "RHBZ#1663176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663176" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3459", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3459" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3459" } ], "release_date": "2019-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" }, { "category": "workaround", "details": "- Disabling the bluetooth hardware in the bios.\n- Prevent loading of the bluetooth kernel modules.\n- Disable the bluetooth connection by putting the system in \"airport\" mode.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Heap address information leak while using L2CAP_GET_CONF_OPT" }, { "cve": "CVE-2019-3460", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-01-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1663179" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_parse_conf_rsp and l2cap_parse_conf_req functions. An attacker with physical access within the range of standard Bluetooth transmission can create a specially crafted packet. The response to this specially crafted packet can contain part of the kernel stack which can be used in a further attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "RHBZ#1663179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1663179" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3460", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3460" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3460" } ], "release_date": "2019-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" }, { "category": "workaround", "details": "- Disabling the bluetooth hardware in the bios.\n- Prevent loading of the bluetooth kernel modules.\n- Disable the bluetooth connection by putting the system in \"airport\" mode.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP" }, { "acknowledgments": [ { "names": [ "Andrea Spagnolo", "Matteo Croce", "Natale Vinto" ], "organization": "Red Hat", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-3874", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-03-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1686373" } ], "notes": [ { "category": "description", "text": "The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: SCTP socket buffer memory leak leading to denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "While this issue affects the Linux Kernel in Red Hat Enterprise Linux, and not OpenShift Container Platform (OCP) 3 code directly. OCP 3 makes use of CGroups in the Kernel to measure and report on the amount of system resources used by an end user application.\n\nThe default Security Context Constraints (SCC) in OpenShift Container Platform 3.x disallow an end user from running a container as root. Also a check is performed by the OCP 3 Installer to ensure SELinux is enabled, [1].\n\n[1] https://github.com/openshift/openshift-ansible/blob/006fb14e9a28df9bd1a58ac376bbdf3eba50fa51/roles/openshift_node/tasks/main.yml#L3", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3874" }, { "category": "external", "summary": "RHBZ#1686373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1686373" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3874", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3874" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3874", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3874" }, { "category": "external", "summary": "https://discuss.kubernetes.io/t/kubernetes-security-announcement-linux-kernel-memory-cgroups-escape-via-sctp-cve-2019-3874/5594", "url": "https://discuss.kubernetes.io/t/kubernetes-security-announcement-linux-kernel-memory-cgroups-escape-via-sctp-cve-2019-3874/5594" }, { "category": "external", "summary": "https://lore.kernel.org/netdev/20190401113110.GA20717@hmswarspite.think-freely.org/T/#u", "url": "https://lore.kernel.org/netdev/20190401113110.GA20717@hmswarspite.think-freely.org/T/#u" } ], "release_date": "2019-03-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" }, { "category": "workaround", "details": "SELinux prevents a bind of the SCTP socket by a non-root user. \n\nTo mitigate this issue if not using SELinux, or if a Security Context Constraint allows running pods as the root user the \u0027sctp\u0027 module should be blacklisted. Please this this Knowledge Base article for more information on how to blacklist a kernel module. https://access.redhat.com/solutions/41278", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: SCTP socket buffer memory leak leading to denial of service" }, { "acknowledgments": [ { "names": [ "Alex Williamson" ], "organization": "Red Hat Inc.", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-3882", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2019-03-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1689426" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s vfio interface implementation that permits violation of the user\u0027s locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS).", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: denial of service vector through vfio DMA mappings", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3882" }, { "category": "external", "summary": "RHBZ#1689426", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1689426" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3882", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3882" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3882" } ], "release_date": "2019-04-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: denial of service vector through vfio DMA mappings" }, { "acknowledgments": [ { "names": [ "Jason Wang" ], "organization": "Red Hat Inc.", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-3900", "cwe": { "id": "CWE-835", "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)" }, "discovery_date": "2019-04-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1698757" } ], "notes": [ { "category": "description", "text": "An infinite loop issue was found in the vhost_net kernel module while handling incoming packets in handle_rx(). The infinite loop could occur if one end sends packets faster than the other end can process them. A guest user, maybe a remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG 2.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 6 and 7. Future kernel updates for Red Hat Enterprise Linux 6 and 7 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-3900" }, { "category": "external", "summary": "RHBZ#1698757", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1698757" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-3900", "url": "https://www.cve.org/CVERecord?id=CVE-2019-3900" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3900" } ], "release_date": "2019-04-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: vhost_net: infinite loop while receiving packets leads to DoS" }, { "cve": "CVE-2019-5489", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1664110" } ], "notes": [ { "category": "description", "text": "A new software page cache side channel attack scenario was discovered in operating systems that implement the very common \u0027page cache\u0027 caching mechanism. A malicious user/process could use \u0027in memory\u0027 page-cache knowledge to infer access timings to shared memory and gain knowledge which can be used to reduce effectiveness of cryptographic strength by monitoring algorithmic behavior, infer access patterns of memory to determine code paths taken, and exfiltrate data to a blinded attacker through page-granularity access times as a side-channel.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: page cache side channel attacks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-5489" }, { "category": "external", "summary": "RHBZ#1664110", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1664110" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-5489", "url": "https://www.cve.org/CVERecord?id=CVE-2019-5489" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-5489", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5489" } ], "release_date": "2019-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Kernel: page cache side channel attacks" }, { "acknowledgments": [ { "names": [ "Felix Wilhelm" ], "organization": "Google" } ], "cve": "CVE-2019-7222", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-01-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1671930" } ], "notes": [ { "category": "description", "text": "An information leakage issue was found in the way Linux kernel\u0027s KVM hypervisor handled page fault exceptions while emulating instructions like VMXON, VMCLEAR, VMPTRLD, and VMWRITE with memory address as an operand. It occurs if the operand is a mmio address, as the returned exception object holds uninitialized stack memory contents. A guest user/process could use this flaw to leak host\u0027s stack memory contents to a guest.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: KVM: leak of uninitialized stack contents to guest", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of the kernel package as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG 2.\n\nThis issue affects the versions of Linux kernel as shipped with Red Hat Enterprise Linux 7. Future kernel updates for Red Hat Enterprise Linux 7 may address this issue.\n\nNote:- Impact on Red Hat Enterprise Linux 7 kernel is limited, as it requires that nested virtualization feature is enabled on a system. Nested Virtualization feature is available only as - Technology Preview.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "RHBZ#1671930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1671930" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-7222", "url": "https://www.cve.org/CVERecord?id=CVE-2019-7222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-7222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7222" } ], "release_date": "2019-02-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Kernel: KVM: leak of uninitialized stack contents to guest" }, { "cve": "CVE-2019-9506", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "discovery_date": "2019-06-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1727857" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in the Bluetooth protocol. An attacker within physical proximity to the Bluetooth connection could downgrade the encryption protocol to be trivially brute forced.", "title": "Vulnerability description" }, { "category": "summary", "text": "hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-9506" }, { "category": "external", "summary": "RHBZ#1727857", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1727857" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-9506", "url": "https://www.cve.org/CVERecord?id=CVE-2019-9506" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-9506", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-9506" } ], "release_date": "2019-08-10T09:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" }, { "category": "workaround", "details": "At this time there is no known mitigation if bluetooth hardware is to be continue to be used. Replacing the hardware with its wired version and disabling bluetooth may be a suitable alternative for some environments.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB)" }, { "acknowledgments": [ { "names": [ "huangwen" ], "organization": "ADLab of Venustech" } ], "cve": "CVE-2019-10126", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2019-05-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1716992" } ], "notes": [ { "category": "description", "text": "A flaw was found in the mwifiex implementation in the Linux kernel. A system connecting to wireless access point could be manipulated by an attacker with advanced permissions on the access point into localized memory corruption or possibly privilege escalation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10126" }, { "category": "external", "summary": "RHBZ#1716992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1716992" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10126", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10126" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10126", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10126" } ], "release_date": "2019-05-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c" }, { "cve": "CVE-2019-10207", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1733874" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s Bluetooth implementation of UART. An attacker with local access and write permissions to the Bluetooth hardware could use this flaw to issue a specially crafted ioctl function call and cause the system to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: null-pointer dereference in hci_uart_set_flow_control", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10207" }, { "category": "external", "summary": "RHBZ#1733874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1733874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10207", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10207" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10207", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10207" } ], "release_date": "2019-07-29T13:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: null-pointer dereference in hci_uart_set_flow_control" }, { "cve": "CVE-2019-10638", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-07-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1729931" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way the Linux kernel derived the IP ID field from a partial kernel space address returned by a net_hash_mix() function. A remote user could observe a weak IP ID generation in this field to track Linux devices.", "title": "Vulnerability description" }, { "category": "summary", "text": "Kernel: net: weak IP ID generation leads to remote device tracking", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6.\n\nThis issue affects the version of Linux kernel as shipped with Red Hat Enterprise Linux 7, 8 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 7, 8 and Red Hat Enterprise MRG 2 may address this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-10638" }, { "category": "external", "summary": "RHBZ#1729931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1729931" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-10638", "url": "https://www.cve.org/CVERecord?id=CVE-2019-10638" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-10638", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-10638" }, { "category": "external", "summary": "https://arxiv.org/pdf/1906.10478.pdf", "url": "https://arxiv.org/pdf/1906.10478.pdf" } ], "release_date": "2019-07-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Kernel: net: weak IP ID generation leads to remote device tracking" }, { "acknowledgments": [ { "names": [ "Andrea Arcangeli" ], "organization": "Red Hat Engineering", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2019-11599", "cwe": { "id": "CWE-667", "name": "Improper Locking" }, "discovery_date": "2019-04-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1705937" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel where the coredump implementation does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs. This allows local users to obtain sensitive information, cause a denial of service (DoS), or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11599" }, { "category": "external", "summary": "RHBZ#1705937", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705937" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11599", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11599" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11599", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11599" } ], "release_date": "2019-04-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping" }, { "cve": "CVE-2019-11833", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-05-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1712072" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of ext4 extent management. The kernel doesn\u0027t correctly initialize memory regions in the extent tree block which may be exported to a local user to obtain sensitive information by reading empty/uninitialized data from the filesystem.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: fs/ext4/extents.c leads to information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "This is a possible information leak of data that existed in the extent tree blocks. While the attacker does not have control of what exists in the blocks prior to this point they may be able to glean confidential information or possibly information that could be used to further another attack.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11833" }, { "category": "external", "summary": "RHBZ#1712072", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1712072" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11833", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11833" } ], "release_date": "2019-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: fs/ext4/extents.c leads to information disclosure" }, { "cve": "CVE-2019-11884", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2019-05-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1709837" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u0027s implementation of the Bluetooth Human Interface Device Protocol (HIDP). A local attacker with access permissions to the Bluetooth device can issue an IOCTL which will trigger the do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c.c. This function can leak potentially sensitive information from the kernel stack memory via a HIDPCONNADD command because a name field may not be correctly NULL terminated.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-11884" }, { "category": "external", "summary": "RHBZ#1709837", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709837" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-11884", "url": "https://www.cve.org/CVERecord?id=CVE-2019-11884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-11884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11884" } ], "release_date": "2019-05-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: sensitive information disclosure from kernel stack memory via HIDPCONNADD command" }, { "cve": "CVE-2019-12382", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2019-05-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1715554" } ], "notes": [ { "category": "description", "text": "A flaw was found in the Linux kernel\u2019s implementation of Extended Display Identification Data (EDID) technology. A firmware identifier string is duplicated with the kstrdup function, and the allocation may fail under very low memory conditions. An attacker could abuse this flaw by causing a Denial of Service and crashing the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2019-12382" }, { "category": "external", "summary": "RHBZ#1715554", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1715554" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2019-12382", "url": "https://www.cve.org/CVERecord?id=CVE-2019-12382" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-12382", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12382" } ], "release_date": "2019-05-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2019-11-05T20:56:57+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.", "product_ids": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2019:3517" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service" }, { "cve": "CVE-2019-13233", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2019-07-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1727756" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in the arch/x86/lib/insn-eval.c function in the Linux kernel. An attacker could corrupt the memory due to a flaw in use-after-free access to an LDT entry caused by a race condition between modify_ldt() and a #BR exception for an MPX bounds violation.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: use-after-free in arch/x86/lib/insn-eval.c", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.src", "BaseOS-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-headers-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-modules-extra-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-tools-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:kernel-tools-libs-devel-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:kernel-zfcpdump-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-core-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-devel-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:kernel-zfcpdump-modules-extra-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:perf-debuginfo-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-0:4.18.0-147.el8.x86_64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.aarch64", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.ppc64le", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.s390x", "BaseOS-8.1.0:python3-perf-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:bpftool-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-0:4.18.0-147.el8.src", "CRB-8.1.0:kernel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-abi-whitelists-0:4.18.0-147.el8.noarch", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-cross-headers-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-core-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debug-modules-extra-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-debuginfo-common-aarch64-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-debuginfo-common-ppc64le-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-debuginfo-common-s390x-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-debuginfo-common-x86_64-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.aarch64", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.ppc64le", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.s390x", "CRB-8.1.0:kernel-devel-0:4.18.0-147.el8.x86_64", "CRB-8.1.0:kernel-doc-0:4.18.0-147.el8.noarch", "CR