Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-7308 (GCVE-0-2019-7308)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:46:45.926Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1711" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "name": "106827", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106827" }, { "name": "USN-3930-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3930-1/" }, { "name": "USN-3931-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3931-1/" }, { "name": "USN-3931-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3931-2/" }, { "name": "USN-3930-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3930-2/" }, { "name": "openSUSE-SU-2019:1193", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K43030517" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.f5.com/csp/article/K43030517?utm_source=f5support\u0026amp%3Butm_medium=RSS" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2019-02-01T00:00:00", "descriptions": [ { "lang": "en", "value": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-09T19:06:33", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "tags": [ "x_refsource_MISC" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1711" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6" }, { "tags": [ "x_refsource_MISC" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "name": "106827", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106827" }, { "name": "USN-3930-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3930-1/" }, { "name": "USN-3931-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3931-1/" }, { "name": "USN-3931-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3931-2/" }, { "name": "USN-3930-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3930-2/" }, { "name": "openSUSE-SU-2019:1193", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K43030517" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.f5.com/csp/article/K43030517?utm_source=f5support\u0026amp%3Butm_medium=RSS" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda", "refsource": "MISC", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1711", "refsource": "MISC", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1711" }, { "name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6", "refsource": "MISC", "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38", "refsource": "MISC", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "name": "https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "name": "106827", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106827" }, { "name": "USN-3930-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3930-1/" }, { "name": "USN-3931-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3931-1/" }, { "name": "USN-3931-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3931-2/" }, { "name": "USN-3930-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3930-2/" }, { "name": "openSUSE-SU-2019:1193", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" }, { "name": "https://support.f5.com/csp/article/K43030517", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K43030517" }, { "name": "https://support.f5.com/csp/article/K43030517?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K43030517?utm_source=f5support\u0026amp;utm_medium=RSS" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-7308", "datePublished": "2019-02-01T22:00:00", "dateReserved": "2019-02-01T00:00:00", "dateUpdated": "2024-08-04T20:46:45.926Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2019-7308\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-02-01T22:29:00.283\",\"lastModified\":\"2024-11-21T04:47:58.557\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, en versiones anteriores a la 4.20.6, \\\"kernel/bpf/verifier.c\\\" realiza especulaciones fuera de l\u00edmites no deseables en la aritm\u00e9tica de punteros en varias ocasiones, incluyendo casos de diferentes ramas con distintos estados o l\u00edmites que hay que sanear, conduciendo a ataques de canal lateral.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"baseScore\":5.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.1,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:C/I:N/A:N\",\"baseScore\":4.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.19.19\",\"matchCriteriaId\":\"628049F8-5F0F-499C-BDD3-30487768D043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.20.0\",\"versionEndExcluding\":\"4.20.6\",\"matchCriteriaId\":\"53904B23-3E55-4CEA-849C-3238A624E9D1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07C312A0-CD2C-4B9C-B064-6409B25C278F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1E78106-58E6-4D59-990F-75DA575BFAD9\"}]}]}],\"references\":[{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/106827\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugs.chromium.org/p/project-zero/issues/detail?id=1711\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K43030517\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.f5.com/csp/article/K43030517?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://usn.ubuntu.com/3930-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3930-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3931-1/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3931-2/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/106827\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugs.chromium.org/p/project-zero/issues/detail?id=1711\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://support.f5.com/csp/article/K43030517\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.f5.com/csp/article/K43030517?utm_source=f5support\u0026amp%3Butm_medium=RSS\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/3930-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3930-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3931-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://usn.ubuntu.com/3931-2/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
gsd-2019-7308
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2019-7308", "description": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "id": "GSD-2019-7308", "references": [ "https://www.suse.com/security/cve/CVE-2019-7308.html", "https://ubuntu.com/security/CVE-2019-7308", "https://advisories.mageia.org/CVE-2019-7308.html", "https://alas.aws.amazon.com/cve/html/CVE-2019-7308.html", "https://linux.oracle.com/cve/CVE-2019-7308.html", "https://packetstormsecurity.com/files/cve/CVE-2019-7308" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2019-7308" ], "details": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "id": "GSD-2019-7308", "modified": "2023-12-13T01:23:46.398160Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7308", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda", "refsource": "MISC", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1711", "refsource": "MISC", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1711" }, { "name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6", "refsource": "MISC", "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38", "refsource": "MISC", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "name": "https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "name": "106827", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106827" }, { "name": "USN-3930-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3930-1/" }, { "name": "USN-3931-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3931-1/" }, { "name": "USN-3931-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3931-2/" }, { "name": "USN-3930-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3930-2/" }, { "name": "openSUSE-SU-2019:1193", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" }, { "name": "https://support.f5.com/csp/article/K43030517", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K43030517" }, { "name": "https://support.f5.com/csp/article/K43030517?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "url": "https://support.f5.com/csp/article/K43030517?utm_source=f5support\u0026amp;utm_medium=RSS" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.19.19", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "4.20.6", "versionStartIncluding": "4.20.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7308" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-189" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "name": "https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "name": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6" }, { "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1711", "refsource": "MISC", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1711" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "name": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "name": "106827", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106827" }, { "name": "USN-3931-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3931-2/" }, { "name": "USN-3931-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3931-1/" }, { "name": "USN-3930-2", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3930-2/" }, { "name": "USN-3930-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3930-1/" }, { "name": "openSUSE-SU-2019:1193", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" }, { "name": "https://support.f5.com/csp/article/K43030517", "refsource": "CONFIRM", "tags": [], "url": "https://support.f5.com/csp/article/K43030517" }, { "name": "https://support.f5.com/csp/article/K43030517?utm_source=f5support\u0026amp;utm_medium=RSS", "refsource": "CONFIRM", "tags": [], "url": "https://support.f5.com/csp/article/K43030517?utm_source=f5support\u0026amp;utm_medium=RSS" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.1, "impactScore": 4.0 } }, "lastModifiedDate": "2019-09-24T20:15Z", "publishedDate": "2019-02-01T22:29Z" } } }
cnvd-2019-47011
Vulnerability from cnvd
Title: Linux kernel数字错误漏洞
Description:
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。
Linux kernel 4.20.6之前版本中存在数字错误漏洞,该漏洞源于网络系统或产品未正确计算或转换所产生的数字。攻击者可利用该漏洞导致整数溢出或符号错误等。
Severity: 中
Patch Name: Linux kernel数字错误漏洞的补丁
Patch Description:
Linux kernel是美国Linux基金会发布的开源操作系统Linux所使用的内核。
Linux kernel 4.20.6之前版本中存在数字错误漏洞,该漏洞源于网络系统或产品未正确计算或转换所产生的数字。攻击者可利用该漏洞导致整数溢出或符号错误等。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6
Reference: https://nvd.nist.gov/vuln/detail/CVE-2019-7308
Name | Linux Linux kernel <4.20.6 |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2019-7308" } }, "description": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u53d1\u5e03\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\n\nLinux kernel 4.20.6\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u6570\u5b57\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u672a\u6b63\u786e\u8ba1\u7b97\u6216\u8f6c\u6362\u6240\u4ea7\u751f\u7684\u6570\u5b57\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u6574\u6570\u6ea2\u51fa\u6216\u7b26\u53f7\u9519\u8bef\u7b49\u3002", "formalWay": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2019-47011", "openTime": "2019-12-26", "patchDescription": "Linux kernel\u662f\u7f8e\u56fdLinux\u57fa\u91d1\u4f1a\u53d1\u5e03\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edfLinux\u6240\u4f7f\u7528\u7684\u5185\u6838\u3002\r\n\r\nLinux kernel 4.20.6\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u6570\u5b57\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u672a\u6b63\u786e\u8ba1\u7b97\u6216\u8f6c\u6362\u6240\u4ea7\u751f\u7684\u6570\u5b57\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u6574\u6570\u6ea2\u51fa\u6216\u7b26\u53f7\u9519\u8bef\u7b49\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Linux kernel\u6570\u5b57\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": "Linux Linux kernel \u003c4.20.6" }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2019-7308", "serverity": "\u4e2d", "submitTime": "2019-02-02", "title": "Linux kernel\u6570\u5b57\u9519\u8bef\u6f0f\u6d1e" }
suse-su-2019:0767-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise Server 12 SP4 Azure kernel was updated to fix various issues.\n\nThe following security bugs were fixed:\n\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166 1128378 1129016).\n- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).\n- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) can cause a system lock up and a denial of service. (bnc#1123161).\n- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglected to set a NULL value for a certain structure member, which led to a use-after-free in sockfs_setattr (bnc#1125907 1126284).\n- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).\n- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).\n- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host\u0027s stack memory contents to a guest (bsc#1124735).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).\n- CVE-2018-20669: An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c where a local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation (bnc#1122971).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).\n- 9p: clear dangling pointers in p9stat_free (bsc#1051510).\n- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).\n- 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n- 9p/net: put a lower bound on msize (bsc#1051510).\n- 9p: use inode-\u003ei_lock to protect i_size_write() under 32-bit (bsc#1051510).\n- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).\n- acpi / device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).\n- acpi/nfit: Block function zero DSMs (bsc#1051510).\n- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).\n- acpi/nfit: Fix bus command validation (bsc#1051510).\n- acpi/nfit: Fix command-supported detection (bsc#1051510).\n- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).\n- acpi/nfit: Fix user-initiated ARS to be \u0027ARS-long\u0027 rather than \u0027ARS-short\u0027 (bsc#1124969).\n- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).\n- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).\n- acpi / video: Extend chassis-type detection with a \u0027Lunch Box\u0027 check (bsc#1051510).\n- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705\n- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).\n- add mainline tags for two hyperv iommu patches\n- Adjust a commit id in a nvme patch to make our scripts happy\n- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).\n- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).\n- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).\n- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).\n- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).\n- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).\n- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).\n- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).\n- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).\n- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).\n- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).\n- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).\n- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).\n- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).\n- alsa: hda - Serialize codec registrations (bsc#1122944).\n- alsa: hda - Use standard device registration for beep (bsc#1122944).\n- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).\n- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).\n- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).\n- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).\n- altera-stapl: check for a null key before strcasecmp\u0027ing it (bsc#1051510).\n- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).\n- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).\n- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).\n- arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).\n- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).\n- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).\n- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).\n- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n- arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).\n- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).\n- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).\n- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).\n- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).\n- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).\n- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).\n- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).\n- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).\n- arm: pxa: avoid section mismatch warning (bsc#1051510).\n- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).\n- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).\n- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).\n- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).\n- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).\n- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).\n- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).\n- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).\n- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).\n- assoc_array: Fix shortcut creation (bsc#1051510).\n- ata: ahci: mvebu: remove stale comment (bsc#1051510).\n- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).\n- ath9k: dynack: check da-\u003eenabled first in sampling routines (bsc#1051510).\n- ath9k: dynack: make ewma estimation faster (bsc#1051510).\n- ath9k: dynack: use authentication messages for \u0027late\u0027 ack (bsc#1051510).\n- atm: he: fix sign-extension overflow on large shift (bsc#1051510).\n- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).\n- ax25: fix possible use-after-free (bsc#1051510).\n- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)\n- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).\n- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).\n- batman-adv: Force mac header to start of data on xmit (bsc#1051510).\n- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).\n- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).\n- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).\n- blk-mq: fix a hung issue when fsync (bsc#1125252).\n- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).\n- block: break discard submissions into the user defined size (git-fixes).\n- block: cleanup __blkdev_issue_discard() (git-fixes).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- blockdev: Fix livelocks on loop device (bsc#1124984).\n- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128895).\n- block: do not warn when doing fsync on read-only devices (bsc#1125252).\n- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).\n- block: fix infinite loop if the device loses discard capability (git-fixes).\n- block/loop: Use global lock for ioctl() operation (bsc#1124974).\n- block: make sure discard bio is aligned with logical block size (git-fixes).\n- block: make sure writesame bio is aligned with logical block size (git-fixes).\n- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).\n- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).\n- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).\n- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).\n- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).\n- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).\n- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).\n- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).\n- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282 ).\n- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).\n- bonding: update nest level on unlink (git-fixes).\n- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).\n- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).\n- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1083647).\n- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).\n- bpf: Fix syscall\u0027s stackmap lookup potential deadlock (bsc#1083647).\n- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).\n- bpf/verifier: fix verifier instability (bsc#1056787).\n- bsg: allocate sense buffer if requested (bsc#1106811).\n- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).\n- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).\n- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).\n- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).\n- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).\n- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).\n- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).\n- btrfs: fix fsync after succession of renames of different files (bsc#1126481).\n- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).\n- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).\n- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).\n- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).\n- btrfs: Improve btrfs_search_slot description (bsc#1126802).\n- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1063638).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).\n- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).\n- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).\n- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1063638).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).\n- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).\n- btrfs: remove always true check in unlock_up (bsc#1126802).\n- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).\n- btrfs: remove unnecessary level check in balance_level (bsc#1126802).\n- btrfs: remove unused check of skip_locking (bsc#1126802).\n- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).\n- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).\n- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n- btrfs: split btrfs_extent_same (bsc#1127493).\n- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).\n- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).\n- can: bcm: check timer values before ktime conversion (bsc#1051510).\n- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).\n- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).\n- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).\n- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126790).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).\n- cfg80211: extend range deviation for DMG (bsc#1051510).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).\n- checkstack.pl: fix for aarch64 (bsc#1051510).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: add missing debug entries for kconfig options (bsc#1051510).\n- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510).\n- cifs: add sha512 secmech (bsc#1051510).\n- cifs: Add support for reading attributes on SMB2+ (bsc#1051510).\n- cifs: Add support for writing attributes on SMB2+ (bsc#1051510).\n- cifs: Always resolve hostname before reconnecting (bsc#1051510).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).\n- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).\n- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).\n- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510).\n- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).\n- cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n- cifs: fix return value for cifs_listxattr (bsc#1051510).\n- cifs: Fix separator when building path from dentry (bsc#1051510).\n- cifs: fix set info (bsc#1051510).\n- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).\n- cifs: fix wrapping bugs in num_entries() (bsc#1051510).\n- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: implement v3.11 preauth integrity (bsc#1051510).\n- cifs: invalidate cache when we truncate a file (bsc#1051510).\n- cifs: make \u0027nodfs\u0027 mount opt a superblock flag (bsc#1051510).\n- cifs: OFD locks do not conflict with eachothers (bsc#1051510).\n- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).\n- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: refactor crypto shash/sdesc allocation\u0026free (bsc#1051510).\n- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).\n- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).\n- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).\n- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).\n- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).\n- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).\n- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).\n- clk: imx6q: reset exclusive gates on init (bsc#1051510).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).\n- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).\n- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).\n- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).\n- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).\n- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).\n- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).\n- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).\n- clk: socfpga: fix refcount leak (bsc#1051510).\n- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).\n- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).\n- clk: sunxi-ng: enable so-said LDOs for A64 SoC\u0027s pll-mipi clock (bsc#1051510).\n- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).\n- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).\n- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).\n- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).\n- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).\n- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).\n- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).\n- configfs: fix registered group removal (bsc#1051510).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).\n- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).\n- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).\n- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).\n- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).\n- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).\n- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).\n- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).\n- crypto: ahash - fix another early termination in hash walk (bsc#1051510).\n- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).\n- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).\n- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).\n- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).\n- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).\n- crypto: caam - fixed handling of sg list (bsc#1051510).\n- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).\n- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).\n- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).\n- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).\n- crypto: hash - set CRYPTO_TFM_NEED_KEY if -\u003esetkey() fails (bsc#1051510).\n- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).\n- crypto: tgr192 - fix unaligned memory access (bsc#1051510).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).\n- cw1200: drop useless LIST_HEAD (bsc#1051510).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).\n- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).\n- debugfs: fix debugfs_rename parameter checking (bsc#1051510).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).\n- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).\n- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).\n- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).\n- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).\n- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).\n- dmaengine: at_hdmac: fix module unloading (bsc#1051510).\n- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).\n- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).\n- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).\n- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).\n- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).\n- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).\n- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).\n- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).\n- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).\n- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).\n- dma: Introduce dma_max_mapping_size() (bsc#1120008).\n- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).\n- dm: call blk_queue_split() to impose device limits on bios (git-fixes).\n- dm: do not allow readahead to limit IO size (git-fixes).\n- dm thin: send event about thin-pool state change _after_ making it (git-fixes).\n- dm zoned: Fix target BIO completion handling (git-fixes).\n- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).\n- doc/README.SUSE: Correct description for building a kernel (bsc#1123348)\n- Do not log confusing message on reconnect by default (bsc#1129664).\n- Do not log expected error on DFS referral request (bsc#1051510).\n- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).\n- driver core: Move async_synchronize_full call (bsc#1051510).\n- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).\n- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: Remove the useless API vmbus_get_outgoing_channel() (bsc#1127577).\n- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).\n- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).\n- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- drivers/sbus/char: add of_node_put() (bsc#1051510).\n- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).\n- drm/ast: Fix connector leak during driver unload (bsc#1051510).\n- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).\n- drm/atomic-helper: Complete fake_commit-\u003eflip_done potentially earlier (bsc#1051510).\n- drm: Block fb changes for async plane updates (bsc#1051510).\n- drm/bridge: tc358767: add defines for DP1_SRCCTRL \u0026 PHY_2LANE (bsc#1051510).\n- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).\n- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).\n- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).\n- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).\n- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n- drm: Clear state-\u003eacquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).\n- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).\n- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)\n- drm/etnaviv: potential NULL dereference (bsc#1113722)\n- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)\n- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)\n- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)\n- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n- drm/i915/gvt: Fix mmap range check (bsc#1120902)\n- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)\n- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).\n- drm/i915/opregion: fix version check (bsc#1113722)\n- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)\n- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)\n- drm/meson: add missing of_node_put (bsc#1051510).\n- drm/modes: Prevent division by zero htotal (bsc#1051510).\n- drm/msm: Fix error return checking (bsc#1051510).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).\n- drm/msm: Unblock writer if reader closes file (bsc#1051510).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)\n- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).\n- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)\n- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)\n- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).\n- drm/rockchip: fix for mailbox read size (bsc#1051510).\n- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)\n- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)\n- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)\n- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).\n- earlycon: Initialize port-\u003euartclk based on clock-frequency property (bsc#1051510).\n- earlycon: Remove hardcoded port-\u003euartclk initialization in of_setup_earlycon (bsc#1051510).\n- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n- Enable livepatch test drivers in lib/ Livepatch kselftests need those.\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).\n- enic: fix checksum validation for IPv6 (bsc#1051510).\n- esp6: fix memleak on error path in esp6_input (bsc#1051510).\n- esp: Fix locking on page fragment allocation (bsc#1051510).\n- esp: Fix memleaks on error paths (bsc#1051510).\n- esp: Fix skb tailroom calculation (bsc#1051510).\n- exportfs: do not read dentry after free (bsc#1051510).\n- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).\n- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).\n- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).\n- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).\n- fat: validate -\u003ei_start before using (bsc#1051510).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1113722)\n- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).\n- Fix kabi issues with new transport sharing code (bsc#1114893).\n- Fix problem with sharetransport= and NFSv4 (bsc#1114893).\n- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).\n- floppy: check_events callback should not return a negative number (bsc#1051510).\n- fork: do not copy inconsistent signal handler state to child (bsc#1051510).\n- fork: record start_time late (git-fixes).\n- fork: unconditionally clear stack on fork (git-fixes).\n- fs/cifs: require sha512 (bsc#1051510).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).\n- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).\n- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).\n- fuse: handle zero sized retrieve correctly (bsc#1051510).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bsc#1051510).\n- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).\n- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).\n- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).\n- geneve, vxlan: Do not set exceptions if skb-\u003elen \u003c mtu (bsc#1123456).\n- genwqe: Fix size check (bsc#1051510).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bsc#1120601).\n- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).\n- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).\n- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).\n- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).\n- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).\n- gpio: pl061: handle failed allocations (bsc#1051510).\n- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).\n- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)\n- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).\n- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).\n- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).\n- hfs: do not free node before using (bsc#1051510).\n- hfsplus: do not free node before using (bsc#1051510).\n- hfsplus: prevent btree data loss on root split (bsc#1051510).\n- hfs: prevent btree data loss on root split (bsc#1051510).\n- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).\n- hpet: Fix missing \u0027=\u0027 character in the __setup() code of hpet_mmap_enable (git-fixes).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).\n- hv_uio_generic: map ringbuffer phys addr (bsc#1127577).\n- hv: v4.12 API for hyperv-iommu (bsc#1122822).\n- hwmon/k10temp: Add support for AMD family 17h, model 30h CPUs ().\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).\n- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).\n- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).\n- hyperv/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).\n- i2c-axxia: check for error conditions first (bsc#1051510).\n- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).\n- i2c: cadence: Fix the hold bit setting (bsc#1051510).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).\n- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).\n- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).\n- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).\n- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).\n- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).\n- ib/core: Destroy QP if XRC QP fails (bsc#1046306).\n- ib/core: Fix potential memory leak while creating MAD agents (bsc#1046306).\n- ib/core: Unregister notifier before freeing MAD security (bsc#1046306).\n- ib/hfi1: Close race condition on user context disable and close (bsc#1060463).\n- ib/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- ide: pmac: add of_node_put() (bsc#1051510).\n- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).\n- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).\n- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).\n- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).\n- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).\n- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).\n- input: bma150 - register input device after setting private data (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).\n- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).\n- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).\n- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).\n- input: raspberrypi-ts - fix link error (git-fixes).\n- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).\n- input: restore EV_ABS ABS_RESERVED (bsc#1051510).\n- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).\n- input: synaptics - enable SMBus for HP EliteBook 840 G4 (bsc#1051510).\n- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).\n- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).\n- intel_th: Do not reference unassigned outputs (bsc#1051510).\n- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).\n- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).\n- iomap: warn on zero-length mappings (bsc#1127062).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).\n- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).\n- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).\n- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).\n- ipmi:pci: Blacklist a Realtek \u0027IPMI\u0027 device (git-fixes).\n- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).\n- ipsec: check return value of skb_to_sgvec always (bsc#1051510).\n- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).\n- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: addrlabel: per netns list (bsc#1122982).\n- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).\n- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).\n- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982). Refresh patches.suse/ip6_vti-fix-a-null-pointer-deference-when-destroy-vt.patch\n- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).\n- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).\n- ip: validate header length on virtual device xmit (networking-stable-19_01_04).\n- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).\n- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).\n- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).\n- iscsi target: fix session creation failure handling (bsc#1051510).\n- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).\n- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).\n- iser: set sector for ambiguous mr status errors (bsc#1051510).\n- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).\n- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).\n- iwlwifi: mvm: fix RSS config command (bsc#1051510).\n- iwlwifi: pcie: fix emergency path (bsc#1051510).\n- iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).\n- ixgbe: check return value of napi_complete_done() (bsc#1051510).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).\n- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).\n- kABI: fix xhci kABI stability (bsc#1119086).\n- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).\n- kabi: handle addition of uevent_sock into struct net (bsc#1122982).\n- kABI: Preserve kABI for dma_max_mapping_size() (bsc#1120008).\n- kABI: protect struct sctp_association (kabi).\n- kABI: protect struct smc_buf_desc (bnc#1117947, LTC#173662).\n- kABI: protect struct smc_link (bnc#1117947, LTC#173662).\n- kABI: protect vhost_log_write (kabi).\n- kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).\n- kABI workaround for bt_accept_enqueue() change (bsc#1051510).\n- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).\n- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).\n- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).\n- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).\n- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).\n- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).\n- keys: allow reaching the keys quotas exactly (bsc#1051510).\n- keys: Timestamp new keys (bsc#1051510).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).\n- kgdboc: Fix restrict error (bsc#1051510).\n- kgdboc: Fix warning with module build (bsc#1051510).\n- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).\n- kobject: copy env blob in one go (bsc#1122982).\n- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).\n- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).\n- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).\n- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).\n- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: fix L1TF\u0027s MMIO GFN calculation (bsc#1124204).\n- kvm: x86: Fix single-step debugging (bsc#1129295).\n- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).\n- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).\n- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).\n- lan78xx: Resolve issue with changing MAC address (bsc#1051510).\n- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).\n- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).\n- libceph: handle an empty authorize reply (bsc#1126789).\n- lib/div64.c: off by one in shift (bsc#1051510).\n- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).\n- libnvdimm/label: Clear \u0027updating\u0027 flag after label-set update (bsc#1129543).\n- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).\n- lib/rbtree-test: lower default params (git-fixes).\n- lightnvm: fail fast on passthrough commands (bsc#1125780).\n- livepatch: Change unsigned long old_addr -\u003e void *old_func in struct klp_func (bsc#1071995).\n- livepatch: Consolidate klp_free functions (bsc#1071995 ).\n- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).\n- livepatch: Define a macro for new API identification (bsc#1071995).\n- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).\n- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).\n- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).\n- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).\n- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).\n- livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).\n- livepatch: Send a fake signal periodically (bsc#1071995 ).\n- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).\n- livepatch: Simplify API by removing registration step (bsc#1071995).\n- llc: do not use sk_eat_skb() (bsc#1051510).\n- lockd: fix access beyond unterminated strings in prints (git-fixes).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: drop caches if offset or block_size are changed (bsc#1124975).\n- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).\n- lsm: Check for NULL cred-security on free (bsc#1051510).\n- mac80211: Add attribute aligned(2) to struct \u0027action\u0027 (bsc#1051510).\n- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).\n- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).\n- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).\n- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).\n- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).\n- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).\n- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).\n- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).\n- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).\n- media: s5k4ecgx: delete a bogus error message (bsc#1051510).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).\n- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).\n- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).\n- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).\n- media: uvcvideo: Fix \u0027type\u0027 check leading to overflow (bsc#1051510).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).\n- media: v4l2-tpg: array index could become negative (bsc#1051510).\n- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).\n- media: vb2: be sure to unlock mutex on errors (bsc#1051510).\n- media: vb2: vb2_mmap: move lock up (bsc#1051510).\n- media: vivid: fix error handling of kthread_run (bsc#1051510).\n- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).\n- media: vivid: set min width/height to a value \u003e 0 (bsc#1051510).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).\n- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).\n- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).\n- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).\n- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).\n- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).\n- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).\n- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).\n- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).\n- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).\n- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).\n- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).\n- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).\n- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).\n- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).\n- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).\n- misc: sram: enable clock before registering regions (bsc#1051510).\n- misc: sram: fix resource leaks in probe error path (bsc#1051510).\n- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).\n- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).\n- mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n- mlx4: trigger IB events needed by SMC (bnc#1117947, LTC#173662).\n- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).\n- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).\n- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).\n- mmap: relax file size limit for regular files (git fixes (mm/mmap)).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).\n- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).\n- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).\n- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).\n- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).\n- mmc: omap: fix the maximum timeout setting (bsc#1051510).\n- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).\n- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n- mmc: spi: Fix card detection during probe (bsc#1051510).\n- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).\n- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).\n- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).\n- mm/ksm.c: ignore STABLE_FLAG of rmap_item-\u003eaddress in rmap_walk_ksm() (git fixes (mm/ksm)).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).\n- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).\n- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)\n- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).\n- mm: migration: factor out code to compute expected number of page references (bsc#1084216).\n- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).\n- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).\n- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).\n- Moved patches.fixes/x86-add-tsx-force-abort-cpuid-msr.patch to patches.arch/ and added upstream tags (bsc#1129363)\n- mpt3sas: check sense buffer before copying sense data (bsc#1106811).\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).\n- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).\n- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).\n- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).\n- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).\n- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).\n- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).\n- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).\n- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).\n- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).\n- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).\n- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).\n- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).\n- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).\n- mtd: nand: ifc: update bufnum mask for ver \u003e= 2.0.0 (bsc#1051510).\n- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).\n- mtd: nand: omap2: Fix subpage write (bsc#1051510).\n- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).\n- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).\n- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).\n- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).\n- mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).\n- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).\n- mv88e6060: disable hardware level MAC learning (bsc#1051510).\n- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).\n- neighbour: Avoid writing before skb-\u003ehead in neigh_hh_output() (networking-stable-18_12_12).\n- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).\n- net: add uevent socket member (bsc#1122982).\n- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).\n- net: aquantia: fixed instack structure overflow (git-fixes).\n- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).\n- net: bcmgenet: abort suspend on error (bsc#1051510).\n- net: bcmgenet: code movement (bsc#1051510).\n- net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n- net: bcmgenet: return correct value \u0027ret\u0027 from bcmgenet_power_down (bsc#1051510).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).\n- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- net: do not call update_pmtu unconditionally (bsc#1123456).\n- net: Do not default Cavium PTP driver to \u0027y\u0027 (bsc#1110096).\n- net: dp83640: expire old TX-skb (networking-stable-19_02_10).\n- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).\n- net: ena: fix race between link up and device initalization (bsc#1083548).\n- netfilter: nf_tables: check the result of dereferencing base_chain-\u003estats (git-fixes).\n- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).\n- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).\n- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).\n- net: hns3: add handling for big TX fragment (bsc#1104353 ).\n- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).\n- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).\n- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).\n- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).\n- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).\n- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).\n- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).\n- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).\n- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).\n- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).\n- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).\n- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).\n- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).\n- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).\n- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).\n- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).\n- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Release resource on error flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).\n- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).\n- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).\n- netns: restrict uevents (bsc#1122982).\n- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).\n- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).\n- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).\n- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).\n- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).\n- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).\n- netrom: switch to sock timer API (bsc#1051510).\n- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).\n- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).\n- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).\n- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).\n- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).\n- net/smc: abort CLC connection in smc_release (bnc#1117947, LTC#173662).\n- net/smc: add infrastructure to send delete rkey messages (bnc#1117947, LTC#173662).\n- net/smc: add SMC-D shutdown signal (bnc#1117947, LTC#173662).\n- net/smc: allow fallback after clc timeouts (bnc#1117947, LTC#173662).\n- net/smc: atomic SMCD cursor handling (bnc#1117947, LTC#173662).\n- net/smc: avoid a delay by waiting for nothing (bnc#1117947, LTC#173662).\n- net/smc: cleanup listen worker mutex unlocking (bnc#1117947, LTC#173662).\n- net/smc: cleanup tcp_listen_worker initialization (bnc#1117947, LTC#173662).\n- net/smc: enable fallback for connection abort in state INIT (bnc#1117947, LTC#173662).\n- net/smc: fix non-blocking connect problem (bnc#1117947, LTC#173662).\n- net/smc: fix sizeof to int comparison (bnc#1117947, LTC#173662).\n- net/smc: fix smc_buf_unuse to use the lgr pointer (bnc#1117947, LTC#173662).\n- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).\n- net/smc: make smc_lgr_free() static (bnc#1117947, LTC#173662).\n- net/smc: no link delete for a never active link (bnc#1117947, LTC#173662).\n- net/smc: no urgent data check for listen sockets (bnc#1117947, LTC#173662).\n- net/smc: remove duplicate mutex_unlock (bnc#1117947, LTC#173662).\n- net/smc: remove sock_error detour in clc-functions (bnc#1117947, LTC#173662).\n- net/smc: short wait for late smc_clc_wait_msg (bnc#1117947, LTC#173662).\n- net/smc: unregister rkeys of unused buffer (bnc#1117947, LTC#173662).\n- net/smc: use after free fix in smc_wr_tx_put_slot() (bnc#1117947, LTC#173662).\n- net/smc: use queue pair number when matching link group (bnc#1117947, LTC#173662).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).\n- net: stmmac: Fix PCI module removal leak (git-fixes).\n- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).\n- net: stmmac: Use mutex instead of spinlock (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).\n- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).\n- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).\n- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).\n- nfit: acpi_nfit_ctl(): Check out_obj-\u003etype in the right place (bsc#1129547).\n- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).\n- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).\n- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n- nfs: Allow NFSv4 mounts to not share transports ().\n- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).\n- nfsd: Fix an Oops in free_session() (git-fixes).\n- nfs: Fix a missed page unlock after pg_doio() (git-fixes).\n- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).\n- nfs: support \u0027nosharetransport\u0027 option (bnc#807502, bnc#828192, ).\n- nfsv4.1: Fix the r/wsize checking (git-fixes).\n- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).\n- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).\n- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).\n- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).\n- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).\n- nvme: kABI fix for scan_lock (bsc#1123882).\n- nvme: lock NS list changes while handling command effects (bsc#1123882).\n- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).\n- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).\n- nvme-multipath: round-robin I/O policy (bsc#1110705).\n- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).\n- of, numa: Validate some distance map rules (bsc#1051510).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).\n- omap2fb: Fix stack memory disclosure (bsc#1120902)\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).\n- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).\n- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).\n- packet: Do not leak dev refcounts on error exit (git-fixes).\n- packet: validate address length if non-zero (networking-stable-19_01_04).\n- packet: validate address length (networking-stable-19_01_04).\n- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).\n- Partially revert \u0027block: fail op_is_write() requests to (bsc#1125252).\n- pci: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).\n- pci: Disable broken RTIT_BAR of Intel TH (bsc#1120318).\n- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).\n- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).\n- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).\n- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).\n- pcrypt: use format specifier in kobject_add (bsc#1051510).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).\n- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).\n- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).\n- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).\n- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).\n- phy: tegra: remove redundant self assignment of \u0027map\u0027 (bsc#1051510).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bsc#1051510).\n- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).\n- pinctrl: meson: fix pull enable register calculation (bsc#1051510).\n- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).\n- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).\n- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).\n- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).\n- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).\n- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).\n- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).\n- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).\n- powerpc: Add an option to disable static PCI bus numbering (bsc#1122159).\n- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).\n- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).\n- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).\n- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).\n- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).\n- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).\n- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).\n- powerpc/tm: Fix comment (bsc#1118338).\n- powerpc/tm: Fix endianness flip on trap (bsc#1118338).\n- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).\n- powerpc/tm: Fix HTM documentation (bsc#1118338).\n- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).\n- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).\n- powerpc/tm: Print 64-bits MSR (bsc#1118338).\n- powerpc/tm: Print scratch value (bsc#1118338).\n- powerpc/tm: Reformat comments (bsc#1118338).\n- powerpc/tm: Remove msr_tm_active() (bsc#1118338).\n- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).\n- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).\n- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).\n- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).\n- powerpc/tm: Update function prototype comment (bsc#1118338).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).\n- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).\n- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).\n- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).\n- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).\n- ptp_kvm: probe for kvm guest availability (bsc#1098382).\n- ptr_ring: wrap back -\u003eproducer in __ptr_ring_swap_queue() (networking-stable-19_01_04).\n- Put the xhci fix patch to the right place in the sorted section\n- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).\n- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).\n- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).\n- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).\n- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).\n- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).\n- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).\n- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).\n- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).\n- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).\n- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).\n- rdma/core: Fix unwinding flow in case of error to register device (bsc#1046306).\n- rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n- Reenable iscsi_tcp module (bsc#1127081)\n- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).\n- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).\n- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).\n- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).\n- remove 2 entries since now we have them, 744889b7cbb56a64f957e65ade7cb65fe3f35714 1adfc5e4136f5967d591c399aff95b3b035f16b7\n- Remove blacklist of virtio patch so we can install it (bsc#1114585)\n- Remove conditional support for SMB2 and SMB3:\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1051510).\n- Revert \u0027Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G\u0027 (bsc#1051510).\n- Revert \u0027openvswitch: Fix template leak in error cases.\u0027 (bsc#1051510).\n- Revert \u0027rpm/kernel-binary.spec.in: rename kGraft to KLP ()\u0027 This reverts commit f84e065a0c26b5f0777e94ceb67dd494bb7b4d2f. The patch should not have gone to SLE12-SP4. SLE12-SP4 still follows kGraft naming.\n- Revert \u0027scsi: qla2xxx: Fix NVMe Target discovery\u0027 (bsc#1125252).\n- Revert \u0027sd: disable logical block provisioning if \u0027lbpme\u0027 is not set\u0027 This reverts commit e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not accepted upstream.\n- Revert \u0027serial: 8250: Fix clearing FIFOs in RS485 mode again\u0027 (bsc#1051510).\n- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.\n- Revert \u0027xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue\u0027 (bsc#1120854).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).\n- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697)\n- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)\n- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).\n- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).\n- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).\n- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).\n- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).\n- s390/early: improve machine detection (git-fixes).\n- s390/ism: clear dmbe_mask bit before SMC IRQ handling (bnc#1117947, LTC#173662).\n- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).\n- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).\n- s390/qeth: fix use-after-free in error path (bsc#1127534).\n- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).\n- s390/sthyi: Fix machine name validity indication (git-fixes).\n- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).\n- sata_rcar: fix deferred probing (bsc#1051510).\n- sbus: char: add of_node_put() (bsc#1051510).\n- sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).\n- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- sch_multiq: fix double free on init failure (bsc#1051510).\n- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes\n- scripts/git_sort/git_sort.py: Add s390/linux.git fixes.\n- scripts/git_sort/git_sort.py: add vfs \u0027fixes\u0027 branch\n- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).\n- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).\n- SCSI: fix queue cleanup race before queue initialization is done (bsc#1125252).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).\n- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).\n- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).\n- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).\n- scsi: lpfc: fix remoteport access (bsc#1125252).\n- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).\n- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).\n- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).\n- scsi: mpt3sas: Add ioc_\u003clevel\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u003clevel\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u003clevel\u003e with MPT3SAS_FMT to ioc_\u003clevel\u003e (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).\n- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).\n- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).\n- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).\n- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).\n- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).\n- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).\n- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).\n- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).\n- scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).\n- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).\n- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).\n- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).\n- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).\n- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).\n- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).\n- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).\n- sctp: kfree_rcu asoc (networking-stable-18_12_12).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).\n- selftests/livepatch: introduce tests (bsc#1071995).\n- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).\n- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).\n- selinux: always allow mounting submounts (bsc#1051510).\n- selinux: fix GPF on invalid policy (bsc#1051510).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).\n- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).\n- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).\n- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).\n- serial: imx: fix error handling in console_setup (bsc#1051510).\n- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).\n- serial/sunsu: fix refcount leak (bsc#1051510).\n- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).\n- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).\n- signal: Always deliver the kernel\u0027s SIGKILL and SIGSTOP to a pid namespace init (git-fixes).\n- skge: potential memory corruption in skge_get_regs() (bsc#1051510).\n- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).\n- sky2: Increase D3 delay again (bsc#1051510).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).\n- smb3.1.1 dialect is no longer experimental (bsc#1051510).\n- smb311: Fix reconnect (bsc#1051510).\n- smb311: Improve checking of negotiate security contexts (bsc#1051510).\n- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).\n- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).\n- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).\n- smb3: check for and properly advertise directory lease support (bsc#1051510).\n- smb3: directory sync should not return an error (bsc#1051510).\n- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).\n- smb3: do not request leases in symlink creation and query (bsc#1051510).\n- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510).\n- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).\n- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).\n- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).\n- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).\n- smb3: fix various xid leaks (bsc#1051510).\n- [SMB3] Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510).\n- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).\n- [SMB3] Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510).\n- smb3: remove noisy warning message on mount (bsc#1129664).\n- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).\n- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).\n- soc/tegra: Do not leak device tree node reference (bsc#1051510).\n- splice: do not merge into linked buffers (git-fixes).\n- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).\n- staging: iio: ad7780: update voltage on read (bsc#1051510).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).\n- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).\n- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).\n- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).\n- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).\n- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).\n- staging: speakup: Replace strncpy with memcpy (bsc#1051510).\n- staging: wilc1000: fix to set correct value for \u0027vif_num\u0027 (bsc#1051510).\n- sunrpc: correct the computation for page_ptr when truncating (git-fixes).\n- sunrpc: Fix a potential race in xprt_connect() (git-fixes).\n- sunrpc: Fix leak of krb5p encode pages (git-fixes).\n- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).\n- sunrpc: safely reallow resvport min/max inversion (git-fixes).\n- supported.conf\n- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).\n- swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).\n- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).\n- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).\n- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).\n- tcp: batch tcp_net_metrics_exit (bsc#1122982).\n- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).\n- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).\n- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).\n- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).\n- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).\n- tcp: lack of available data can also cause TSO defer (git-fixes).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).\n- team: Free BPF filter when unregistering netdev (bsc#1051510).\n- Thermal: do not clear passive state during system sleep (bsc#1051510).\n- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).\n- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).\n- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).\n- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).\n- thermal: mediatek: fix register index error (bsc#1051510).\n- timekeeping: Use proper seqcount initializer (bsc#1051510).\n- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).\n- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).\n- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).\n- tipc: fix a double kfree_skb() (networking-stable-19_01_04).\n- tipc: fix a race condition of releasing subscriber object (bsc#1051510).\n- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).\n- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).\n- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).\n- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).\n- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).\n- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).\n- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).\n- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).\n- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).\n- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).\n- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).\n- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).\n- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).\n- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).\n- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).\n- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).\n- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).\n- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).\n- uevent: add alloc_uevent_skb() helper (bsc#1122982).\n- uio_hv_generic: defer opening vmbus until first use (bsc#1127577).\n- uio_hv_generic: set callbacks on open (bsc#1127577).\n- uio: introduce UIO_MEM_IOVA (bsc#1127577).\n- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).\n- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).\n- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.\n- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).\n- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).\n- usb: Add new USB LPM helpers (bsc#1120902).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).\n- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).\n- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).\n- usb: dwc3: gadget: Clear req-\u003eneeds_extra_trb flag on cleanup (bsc#1120902).\n- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).\n- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).\n- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).\n- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).\n- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).\n- usb: musb: dsps: fix otg state machine (bsc#1051510).\n- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).\n- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).\n- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n- usb: phy: am335x: fix race condition in _probe (bsc#1051510).\n- usb: serial: option: add Fibocom NL678 series (bsc#1120902).\n- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).\n- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).\n- usb: storage: add quirk for SMI SM3350 (bsc#1120902).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).\n- usb: xhci: fix \u0027broken_suspend\u0027 placement in struct xchi_hcd (bsc#1119086).\n- veth: set peer GSO values (bsc#1051510).\n- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n- vfio: ccw: process ssch with interrupts disabled (git-fixes).\n- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).\n- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).\n- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).\n- vhost: log dirty page correctly (networking-stable-19_01_26).\n- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).\n- vhost/vsock: fix uninitialized vhost_vsock-\u003eguest_cid (bsc#1051510).\n- video: clps711x-fb: release disp device node in probe() (bsc#1051510).\n- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).\n- virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).\n- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).\n- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).\n- virtio/s390: avoid race on vcdev-\u003econfig (git-fixes).\n- virtio/s390: fix race in ccw_io_helper() (git-fixes).\n- vmbus: fix subchannel removal (bsc#1127577).\n- vmbus: keep pointer to ring buffer page (bsc#1127577).\n- vmbus: pass channel to hv_process_channel_removal (bsc#1127577).\n- vmbus: split ring buffer allocation from open (bsc#1127577).\n- VMCI: Support upto 64-bit PPNs (bsc#1127286).\n- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).\n- VSOCK: Send reset control packet when socket is partially bound (networking-stable-19_01_04).\n- vt: invoke notifier on screen size change (bsc#1051510).\n- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).\n- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling gro_cells_receive() (git-fixes).\n- vxlan: update skb dst pmtu on tx path (bsc#1123456).\n- w90p910_ether: remove incorrect __init annotation (bsc#1051510).\n- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).\n- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/amd_nb: Add PCI device IDs for family 17h, model 30h ().\n- x86/amd_nb: Add support for newer PCI topologies ().\n- x86/a.out: Clear the dump structure initially (bsc#1114279).\n- x86/apic: Provide apic_ack_irq() (bsc#1122822).\n- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).\n- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).\n- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).\n- x86/bugs: Add AMD\u0027s variant of SSB_NO (bsc#1114279).\n- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).\n- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).\n- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).\n- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).\n- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).\n- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).\n- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).\n- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).\n- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).\n- x86/vdso: Remove obsolete \u0027fake section table\u0027 reservation (bsc#1114279).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).\n- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).\n- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: fix dom0 boot on huge systems (bsc#1127836).\n- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).\n- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).\n- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).\n- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).\n- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).\n- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).\n- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).\n- Yama: Check for pid death before checking ancestry (bsc#1051510).\n- yam: fix a missing-check bug (bsc#1051510).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-767,SUSE-SLE-SERVER-12-SP4-2019-767", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0767-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0767-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190767-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0767-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005245.html" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050252", "url": "https://bugzilla.suse.com/1050252" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1054610", "url": "https://bugzilla.suse.com/1054610" }, { "category": "self", "summary": "SUSE Bug 1055121", "url": "https://bugzilla.suse.com/1055121" }, { "category": "self", "summary": "SUSE Bug 1056658", "url": "https://bugzilla.suse.com/1056658" }, { "category": "self", "summary": "SUSE Bug 1056662", "url": "https://bugzilla.suse.com/1056662" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1063638", "url": "https://bugzilla.suse.com/1063638" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1070995", "url": "https://bugzilla.suse.com/1070995" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1084216", "url": "https://bugzilla.suse.com/1084216" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1088133", "url": "https://bugzilla.suse.com/1088133" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098382", "url": "https://bugzilla.suse.com/1098382" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106434", "url": "https://bugzilla.suse.com/1106434" }, { "category": "self", "summary": "SUSE Bug 1106811", "url": "https://bugzilla.suse.com/1106811" }, { "category": "self", "summary": "SUSE Bug 1107078", "url": "https://bugzilla.suse.com/1107078" }, { "category": "self", "summary": "SUSE Bug 1107665", "url": "https://bugzilla.suse.com/1107665" }, { "category": "self", "summary": "SUSE Bug 1108101", "url": "https://bugzilla.suse.com/1108101" }, { "category": "self", "summary": "SUSE Bug 1108870", "url": "https://bugzilla.suse.com/1108870" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1110096", "url": "https://bugzilla.suse.com/1110096" }, { "category": "self", "summary": "SUSE Bug 1110705", "url": "https://bugzilla.suse.com/1110705" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1113042", "url": "https://bugzilla.suse.com/1113042" }, { "category": "self", "summary": "SUSE Bug 1113712", "url": "https://bugzilla.suse.com/1113712" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113939", "url": "https://bugzilla.suse.com/1113939" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114585", "url": "https://bugzilla.suse.com/1114585" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117155", "url": "https://bugzilla.suse.com/1117155" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1117947", "url": "https://bugzilla.suse.com/1117947" }, { "category": "self", "summary": "SUSE Bug 1118338", "url": "https://bugzilla.suse.com/1118338" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119086", "url": "https://bugzilla.suse.com/1119086" }, { "category": "self", "summary": "SUSE Bug 1119766", "url": "https://bugzilla.suse.com/1119766" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120008", "url": "https://bugzilla.suse.com/1120008" }, { "category": "self", "summary": "SUSE Bug 1120318", "url": "https://bugzilla.suse.com/1120318" }, { "category": "self", "summary": "SUSE Bug 1120601", "url": "https://bugzilla.suse.com/1120601" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120854", "url": "https://bugzilla.suse.com/1120854" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1120909", "url": "https://bugzilla.suse.com/1120909" }, { "category": "self", "summary": "SUSE Bug 1120955", "url": "https://bugzilla.suse.com/1120955" }, { "category": "self", "summary": "SUSE Bug 1121317", "url": "https://bugzilla.suse.com/1121317" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1121789", "url": "https://bugzilla.suse.com/1121789" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122159", "url": "https://bugzilla.suse.com/1122159" }, { "category": "self", "summary": "SUSE Bug 1122192", "url": "https://bugzilla.suse.com/1122192" }, { "category": "self", "summary": "SUSE Bug 1122324", "url": "https://bugzilla.suse.com/1122324" }, { "category": "self", "summary": "SUSE Bug 1122554", "url": "https://bugzilla.suse.com/1122554" }, { "category": "self", "summary": "SUSE Bug 1122662", "url": "https://bugzilla.suse.com/1122662" }, { "category": "self", "summary": "SUSE Bug 1122764", "url": "https://bugzilla.suse.com/1122764" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122822", "url": "https://bugzilla.suse.com/1122822" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1122927", "url": "https://bugzilla.suse.com/1122927" }, { "category": "self", "summary": "SUSE Bug 1122944", "url": "https://bugzilla.suse.com/1122944" }, { "category": "self", "summary": "SUSE Bug 1122971", "url": "https://bugzilla.suse.com/1122971" }, { "category": "self", "summary": "SUSE Bug 1122982", "url": "https://bugzilla.suse.com/1122982" }, { "category": "self", "summary": "SUSE Bug 1123060", "url": "https://bugzilla.suse.com/1123060" }, { "category": "self", "summary": "SUSE Bug 1123061", "url": "https://bugzilla.suse.com/1123061" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1123317", "url": "https://bugzilla.suse.com/1123317" }, { "category": "self", "summary": "SUSE Bug 1123348", "url": "https://bugzilla.suse.com/1123348" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE Bug 1123456", "url": "https://bugzilla.suse.com/1123456" }, { "category": "self", "summary": "SUSE Bug 1123538", "url": "https://bugzilla.suse.com/1123538" }, { "category": "self", "summary": "SUSE Bug 1123697", "url": "https://bugzilla.suse.com/1123697" }, { "category": "self", "summary": "SUSE Bug 1123882", "url": "https://bugzilla.suse.com/1123882" }, { "category": "self", "summary": "SUSE Bug 1123933", "url": "https://bugzilla.suse.com/1123933" }, { "category": "self", "summary": "SUSE Bug 1124055", "url": "https://bugzilla.suse.com/1124055" }, { "category": "self", "summary": "SUSE Bug 1124204", "url": "https://bugzilla.suse.com/1124204" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124579", "url": "https://bugzilla.suse.com/1124579" }, { "category": "self", "summary": "SUSE Bug 1124589", "url": "https://bugzilla.suse.com/1124589" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1124969", "url": "https://bugzilla.suse.com/1124969" }, { "category": "self", "summary": "SUSE Bug 1124974", "url": "https://bugzilla.suse.com/1124974" }, { "category": "self", "summary": "SUSE Bug 1124975", "url": "https://bugzilla.suse.com/1124975" }, { "category": "self", "summary": "SUSE Bug 1124976", "url": "https://bugzilla.suse.com/1124976" }, { "category": "self", "summary": "SUSE Bug 1124978", "url": "https://bugzilla.suse.com/1124978" }, { "category": "self", "summary": "SUSE Bug 1124979", "url": "https://bugzilla.suse.com/1124979" }, { "category": "self", "summary": "SUSE Bug 1124980", "url": "https://bugzilla.suse.com/1124980" }, { "category": "self", "summary": "SUSE Bug 1124981", "url": "https://bugzilla.suse.com/1124981" }, { "category": "self", "summary": "SUSE Bug 1124982", "url": "https://bugzilla.suse.com/1124982" }, { "category": "self", "summary": "SUSE Bug 1124984", "url": "https://bugzilla.suse.com/1124984" }, { "category": "self", "summary": "SUSE Bug 1124985", "url": "https://bugzilla.suse.com/1124985" }, { "category": "self", "summary": "SUSE Bug 1125109", "url": "https://bugzilla.suse.com/1125109" }, { "category": "self", "summary": "SUSE Bug 1125125", "url": "https://bugzilla.suse.com/1125125" }, { "category": "self", "summary": "SUSE Bug 1125252", "url": "https://bugzilla.suse.com/1125252" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125614", "url": "https://bugzilla.suse.com/1125614" }, { "category": "self", "summary": "SUSE Bug 1125728", "url": "https://bugzilla.suse.com/1125728" }, { "category": "self", "summary": "SUSE Bug 1125780", "url": "https://bugzilla.suse.com/1125780" }, { "category": "self", "summary": "SUSE Bug 1125797", "url": "https://bugzilla.suse.com/1125797" }, { "category": "self", "summary": "SUSE Bug 1125799", "url": "https://bugzilla.suse.com/1125799" }, { "category": "self", "summary": "SUSE Bug 1125800", "url": "https://bugzilla.suse.com/1125800" }, { "category": "self", "summary": "SUSE Bug 1125907", "url": "https://bugzilla.suse.com/1125907" }, { "category": "self", "summary": "SUSE Bug 1125947", "url": "https://bugzilla.suse.com/1125947" }, { "category": "self", "summary": "SUSE Bug 1126131", "url": "https://bugzilla.suse.com/1126131" }, { "category": "self", "summary": "SUSE Bug 1126209", "url": "https://bugzilla.suse.com/1126209" }, { "category": "self", "summary": "SUSE Bug 1126284", "url": "https://bugzilla.suse.com/1126284" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126393", "url": "https://bugzilla.suse.com/1126393" }, { "category": "self", "summary": "SUSE Bug 1126476", "url": "https://bugzilla.suse.com/1126476" }, { "category": "self", "summary": "SUSE Bug 1126480", "url": "https://bugzilla.suse.com/1126480" }, { "category": "self", "summary": "SUSE Bug 1126481", "url": "https://bugzilla.suse.com/1126481" }, { "category": "self", "summary": "SUSE Bug 1126488", "url": "https://bugzilla.suse.com/1126488" }, { "category": "self", "summary": "SUSE Bug 1126495", "url": "https://bugzilla.suse.com/1126495" }, { "category": "self", "summary": "SUSE Bug 1126555", "url": "https://bugzilla.suse.com/1126555" }, { "category": "self", "summary": "SUSE Bug 1126579", "url": "https://bugzilla.suse.com/1126579" }, { "category": "self", "summary": "SUSE Bug 1126789", "url": "https://bugzilla.suse.com/1126789" }, { "category": "self", "summary": "SUSE Bug 1126790", "url": "https://bugzilla.suse.com/1126790" }, { "category": "self", "summary": "SUSE Bug 1126802", "url": "https://bugzilla.suse.com/1126802" }, { "category": "self", "summary": "SUSE Bug 1126803", "url": "https://bugzilla.suse.com/1126803" }, { "category": "self", "summary": "SUSE Bug 1126804", "url": "https://bugzilla.suse.com/1126804" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1126806", "url": "https://bugzilla.suse.com/1126806" }, { "category": "self", "summary": "SUSE Bug 1126807", "url": "https://bugzilla.suse.com/1126807" }, { "category": "self", "summary": "SUSE Bug 1127042", "url": "https://bugzilla.suse.com/1127042" }, { "category": "self", "summary": "SUSE Bug 1127062", "url": "https://bugzilla.suse.com/1127062" }, { "category": "self", "summary": "SUSE Bug 1127081", "url": "https://bugzilla.suse.com/1127081" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127154", "url": "https://bugzilla.suse.com/1127154" }, { "category": "self", "summary": "SUSE Bug 1127285", "url": "https://bugzilla.suse.com/1127285" }, { "category": "self", "summary": "SUSE Bug 1127286", "url": "https://bugzilla.suse.com/1127286" }, { "category": "self", "summary": "SUSE Bug 1127307", "url": "https://bugzilla.suse.com/1127307" }, { "category": "self", "summary": "SUSE Bug 1127363", "url": "https://bugzilla.suse.com/1127363" }, { "category": "self", "summary": "SUSE Bug 1127493", "url": "https://bugzilla.suse.com/1127493" }, { "category": "self", "summary": "SUSE Bug 1127494", "url": "https://bugzilla.suse.com/1127494" }, { "category": "self", "summary": "SUSE Bug 1127495", "url": "https://bugzilla.suse.com/1127495" }, { "category": "self", "summary": "SUSE Bug 1127496", "url": "https://bugzilla.suse.com/1127496" }, { "category": "self", "summary": "SUSE Bug 1127497", "url": "https://bugzilla.suse.com/1127497" }, { "category": "self", "summary": "SUSE Bug 1127498", "url": "https://bugzilla.suse.com/1127498" }, { "category": "self", "summary": "SUSE Bug 1127534", "url": "https://bugzilla.suse.com/1127534" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127567", "url": "https://bugzilla.suse.com/1127567" }, { "category": "self", "summary": "SUSE Bug 1127577", "url": "https://bugzilla.suse.com/1127577" }, { "category": "self", "summary": "SUSE Bug 1127595", "url": "https://bugzilla.suse.com/1127595" }, { "category": "self", "summary": "SUSE Bug 1127603", "url": "https://bugzilla.suse.com/1127603" }, { "category": "self", "summary": "SUSE Bug 1127682", "url": "https://bugzilla.suse.com/1127682" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127750", "url": "https://bugzilla.suse.com/1127750" }, { "category": "self", "summary": "SUSE Bug 1127836", "url": "https://bugzilla.suse.com/1127836" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128094", "url": "https://bugzilla.suse.com/1128094" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128351", "url": "https://bugzilla.suse.com/1128351" }, { "category": "self", "summary": "SUSE Bug 1128378", "url": "https://bugzilla.suse.com/1128378" }, { "category": "self", "summary": "SUSE Bug 1128451", "url": "https://bugzilla.suse.com/1128451" }, { "category": "self", "summary": "SUSE Bug 1128895", "url": "https://bugzilla.suse.com/1128895" }, { "category": "self", "summary": "SUSE Bug 1129016", "url": "https://bugzilla.suse.com/1129016" }, { "category": "self", "summary": "SUSE Bug 1129046", "url": "https://bugzilla.suse.com/1129046" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129163", "url": "https://bugzilla.suse.com/1129163" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129181", "url": "https://bugzilla.suse.com/1129181" }, { "category": "self", "summary": "SUSE Bug 1129182", "url": "https://bugzilla.suse.com/1129182" }, { "category": "self", "summary": "SUSE Bug 1129183", "url": "https://bugzilla.suse.com/1129183" }, { "category": "self", "summary": "SUSE Bug 1129184", "url": "https://bugzilla.suse.com/1129184" }, { "category": "self", "summary": "SUSE Bug 1129205", "url": "https://bugzilla.suse.com/1129205" }, { "category": "self", "summary": "SUSE Bug 1129281", "url": "https://bugzilla.suse.com/1129281" }, { "category": "self", "summary": "SUSE Bug 1129284", "url": "https://bugzilla.suse.com/1129284" }, { "category": "self", "summary": "SUSE Bug 1129285", "url": "https://bugzilla.suse.com/1129285" }, { "category": "self", "summary": "SUSE Bug 1129291", "url": "https://bugzilla.suse.com/1129291" }, { "category": "self", "summary": "SUSE Bug 1129292", "url": "https://bugzilla.suse.com/1129292" }, { "category": "self", "summary": "SUSE Bug 1129293", "url": "https://bugzilla.suse.com/1129293" }, { "category": "self", "summary": "SUSE Bug 1129294", "url": "https://bugzilla.suse.com/1129294" }, { "category": "self", "summary": "SUSE Bug 1129295", "url": "https://bugzilla.suse.com/1129295" }, { "category": "self", "summary": "SUSE Bug 1129296", "url": "https://bugzilla.suse.com/1129296" }, { "category": "self", "summary": "SUSE Bug 1129326", "url": "https://bugzilla.suse.com/1129326" }, { "category": "self", "summary": "SUSE Bug 1129327", "url": "https://bugzilla.suse.com/1129327" }, { "category": "self", "summary": "SUSE Bug 1129330", "url": "https://bugzilla.suse.com/1129330" }, { "category": "self", "summary": "SUSE Bug 1129363", "url": "https://bugzilla.suse.com/1129363" }, { "category": "self", "summary": "SUSE Bug 1129366", "url": "https://bugzilla.suse.com/1129366" }, { "category": "self", "summary": "SUSE Bug 1129497", "url": "https://bugzilla.suse.com/1129497" }, { "category": "self", "summary": "SUSE Bug 1129519", "url": "https://bugzilla.suse.com/1129519" }, { "category": "self", "summary": "SUSE Bug 1129543", "url": "https://bugzilla.suse.com/1129543" }, { "category": "self", "summary": "SUSE Bug 1129547", "url": "https://bugzilla.suse.com/1129547" }, { "category": "self", "summary": "SUSE Bug 1129551", "url": "https://bugzilla.suse.com/1129551" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129625", "url": "https://bugzilla.suse.com/1129625" }, { "category": "self", "summary": "SUSE Bug 1129664", "url": "https://bugzilla.suse.com/1129664" }, { "category": "self", "summary": "SUSE Bug 1129739", "url": "https://bugzilla.suse.com/1129739" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 807502", "url": "https://bugzilla.suse.com/807502" }, { "category": "self", "summary": "SUSE Bug 828192", "url": "https://bugzilla.suse.com/828192" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20669 page", "url": "https://www.suse.com/security/cve/CVE-2018-20669/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7308 page", "url": "https://www.suse.com/security/cve/CVE-2019-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8980 page", "url": "https://www.suse.com/security/cve/CVE-2019-8980/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-03-27T09:34:13Z", "generator": { "date": "2019-03-27T09:34:13Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0767-1", "initial_release_date": "2019-03-27T09:34:13Z", "revision_history": [ { "date": "2019-03-27T09:34:13Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-6.9.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-6.9.1.noarch", "product_id": "kernel-devel-azure-4.12.14-6.9.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-6.9.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-6.9.1.noarch", "product_id": "kernel-source-azure-4.12.14-6.9.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-6.9.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-6.9.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-6.9.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-6.9.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-6.9.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-6.9.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-azure-4.12.14-6.9.1.x86_64", "product_id": "kernel-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-6.9.1.x86_64", "product_id": "kernel-azure-base-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-6.9.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-6.9.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-kgraft-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-azure-kgraft-4.12.14-6.9.1.x86_64", "product_id": "kernel-azure-kgraft-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-6.9.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-6.9.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-6.9.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-6.9.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-6.9.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-6.9.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-6.9.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-6.9.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-6.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-6.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-6.9.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-6.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-6.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-6.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-6.9.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-6.9.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-6.9.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-6.9.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20669" } ], "notes": [ { "category": "general", "text": "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20669", "url": "https://www.suse.com/security/cve/CVE-2018-20669" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2018-20669", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "important" } ], "title": "CVE-2018-20669" }, { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-3819" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "important" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "important" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7308" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7308", "url": "https://www.suse.com/security/cve/CVE-2019-7308" }, { "category": "external", "summary": "SUSE Bug 1124055 for CVE-2019-7308", "url": "https://bugzilla.suse.com/1124055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "important" } ], "title": "CVE-2019-7308" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "important" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-8980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8980" } ], "notes": [ { "category": "general", "text": "A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8980", "url": "https://www.suse.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "SUSE Bug 1126209 for CVE-2019-8980", "url": "https://bugzilla.suse.com/1126209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "low" } ], "title": "CVE-2019-8980" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Server 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-base-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-azure-devel-4.12.14-6.9.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-azure-4.12.14-6.9.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-azure-4.12.14-6.9.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-27T09:34:13Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
suse-su-2019:0765-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks. (bnc#1122971).\n- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) can cause a system lock up and a denial of service. (bnc#1123161).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728 ).\n- CVE-2019-7221: Fixed a use-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).\n- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host\u0027s stack memory contents to a guest (bsc#1124735).\n- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).\n- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).\n- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).\n- 9p: clear dangling pointers in p9stat_free (bsc#1051510).\n- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).\n- 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n- 9p/net: put a lower bound on msize (bsc#1051510).\n- 9p: use inode-\u003ei_lock to protect i_size_write() under 32-bit (bsc#1051510).\n- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).\n- acpi/device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).\n- acpi/nfit: Block function zero DSMs (bsc#1051510).\n- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).\n- acpi/nfit: Fix bus command validation (bsc#1051510).\n- acpi/nfit: Fix command-supported detection (bsc#1051510).\n- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).\n- acpi/nfit: Fix user-initiated ARS to be \u0027ARS-long\u0027 rather than \u0027ARS-short\u0027 (bsc#1124969).\n- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).\n- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).\n- acpi / video: Extend chassis-type detection with a \u0027Lunch Box\u0027 check (bsc#1051510).\n- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705\n- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).\n- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).\n- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).\n- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).\n- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).\n- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).\n- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).\n- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).\n- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).\n- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).\n- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).\n- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).\n- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).\n- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).\n- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).\n- alsa: hda - Serialize codec registrations (bsc#1122944).\n- alsa: hda - Use standard device registration for beep (bsc#1122944).\n- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).\n- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).\n- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).\n- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).\n- altera-stapl: check for a null key before strcasecmp\u0027ing it (bsc#1051510).\n- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).\n- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).\n- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).\n- arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).\n- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).\n- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).\n- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).\n- arm/arm64: kvm: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n- arm/arm64: kvm: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).\n- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).\n- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).\n- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).\n- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n- arm: kvm: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).\n- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).\n- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).\n- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).\n- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).\n- arm: pxa: avoid section mismatch warning (bsc#1051510).\n- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).\n- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).\n- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).\n- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).\n- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).\n- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).\n- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).\n- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).\n- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).\n- assoc_array: Fix shortcut creation (bsc#1051510).\n- ata: ahci: mvebu: remove stale comment (bsc#1051510).\n- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).\n- ath9k: dynack: check da-\u003eenabled first in sampling routines (bsc#1051510).\n- ath9k: dynack: make ewma estimation faster (bsc#1051510).\n- ath9k: dynack: use authentication messages for \u0027late\u0027 ack (bsc#1051510).\n- atm: he: fix sign-extension overflow on large shift (bsc#1051510).\n- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).\n- ax25: fix possible use-after-free (bsc#1051510).\n- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)\n- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).\n- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).\n- batman-adv: Force mac header to start of data on xmit (bsc#1051510).\n- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).\n- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).\n- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).\n- blk-mq: fix a hung issue when fsync (bsc#1125252).\n- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).\n- block: break discard submissions into the user defined size (git-fixes).\n- block: cleanup __blkdev_issue_discard() (git-fixes).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- blockdev: Fix livelocks on loop device (bsc#1124984).\n- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128895).\n- block: do not warn when doing fsync on read-only devices (bsc#1125252).\n- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).\n- block: fix infinite loop if the device loses discard capability (git-fixes).\n- block/loop: Use global lock for ioctl() operation (bsc#1124974).\n- block: make sure discard bio is aligned with logical block size (git-fixes).\n- block: make sure writesame bio is aligned with logical block size (git-fixes).\n- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).\n- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).\n- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).\n- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).\n- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).\n- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).\n- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).\n- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).\n- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282 ).\n- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).\n- bonding: update nest level on unlink (git-fixes).\n- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).\n- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).\n- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1083647).\n- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).\n- bpf: Fix syscall\u0027s stackmap lookup potential deadlock (bsc#1083647).\n- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).\n- bpf/verifier: fix verifier instability (bsc#1056787).\n- bsg: allocate sense buffer if requested (bsc#1106811).\n- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).\n- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).\n- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).\n- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).\n- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).\n- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).\n- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).\n- btrfs: fix fsync after succession of renames of different files (bsc#1126481).\n- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).\n- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).\n- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).\n- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).\n- btrfs: Improve btrfs_search_slot description (bsc#1126802).\n- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1063638).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).\n- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).\n- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).\n- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1063638).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).\n- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).\n- btrfs: remove always true check in unlock_up (bsc#1126802).\n- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).\n- btrfs: remove unnecessary level check in balance_level (bsc#1126802).\n- btrfs: remove unused check of skip_locking (bsc#1126802).\n- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).\n- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).\n- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n- btrfs: split btrfs_extent_same (bsc#1127493).\n- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).\n- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).\n- can: bcm: check timer values before ktime conversion (bsc#1051510).\n- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).\n- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).\n- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).\n- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126790).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).\n- cfg80211: extend range deviation for DMG (bsc#1051510).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).\n- checkstack.pl: fix for aarch64 (bsc#1051510).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: add missing debug entries for kconfig options (bsc#1051510).\n- cifs: add missing support for ACLs in smb 3.11 (bsc#1051510).\n- cifs: add sha512 secmech (bsc#1051510).\n- cifs: Add support for reading attributes on smb2+ (bsc#1051510).\n- cifs: Add support for writing attributes on smb2+ (bsc#1051510).\n- cifs: Always resolve hostname before reconnecting (bsc#1051510).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).\n- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).\n- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).\n- cifs: Fix error mapping for smb2_LOCK command which caused OFD lock problem (bsc#1051510).\n- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).\n- cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n- cifs: fix return value for cifs_listxattr (bsc#1051510).\n- cifs: Fix separator when building path from dentry (bsc#1051510).\n- cifs: fix set info (bsc#1051510).\n- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).\n- cifs: fix wrapping bugs in num_entries() (bsc#1051510).\n- cifs: For smb2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: implement v3.11 preauth integrity (bsc#1051510).\n- cifs: invalidate cache when we truncate a file (bsc#1051510).\n- cifs: make \u0027nodfs\u0027 mount opt a superblock flag (bsc#1051510).\n- cifs: OFD locks do not conflict with eachothers (bsc#1051510).\n- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).\n- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: refactor crypto shash/sdesc allocation\u0026free (bsc#1051510).\n- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).\n- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).\n- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).\n- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).\n- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).\n- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).\n- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).\n- clk: imx6q: reset exclusive gates on init (bsc#1051510).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).\n- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).\n- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).\n- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).\n- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).\n- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).\n- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).\n- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).\n- clk: socfpga: fix refcount leak (bsc#1051510).\n- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).\n- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).\n- clk: sunxi-ng: enable so-said LDOs for A64 SoC\u0027s pll-mipi clock (bsc#1051510).\n- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).\n- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).\n- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).\n- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).\n- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).\n- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).\n- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).\n- configfs: fix registered group removal (bsc#1051510).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).\n- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).\n- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).\n- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).\n- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).\n- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).\n- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).\n- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).\n- crypto: ahash - fix another early termination in hash walk (bsc#1051510).\n- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).\n- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).\n- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).\n- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).\n- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).\n- crypto: caam - fixed handling of sg list (bsc#1051510).\n- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).\n- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).\n- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).\n- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).\n- crypto: hash - set CRYPTO_TFM_NEED_KEY if -\u003esetkey() fails (bsc#1051510).\n- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).\n- crypto: tgr192 - fix unaligned memory access (bsc#1051510).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).\n- cw1200: drop useless LIST_HEAD (bsc#1051510).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).\n- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).\n- debugfs: fix debugfs_rename parameter checking (bsc#1051510).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).\n- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).\n- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).\n- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).\n- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).\n- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).\n- dmaengine: at_hdmac: fix module unloading (bsc#1051510).\n- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).\n- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).\n- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).\n- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).\n- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).\n- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).\n- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).\n- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).\n- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).\n- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).\n- dma: Introduce dma_max_mapping_size() (bsc#1120008).\n- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).\n- dm: call blk_queue_split() to impose device limits on bios (git-fixes).\n- dm: do not allow readahead to limit IO size (git-fixes).\n- dm thin: send event about thin-pool state change _after_ making it (git-fixes).\n- dm zoned: Fix target BIO completion handling (git-fixes).\n- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).\n- doc/README.SUSE: Correct description for building a kernel (bsc#1123348)\n- Do not log confusing message on reconnect by default (bsc#1129664).\n- Do not log expected error on DFS referral request (bsc#1051510).\n- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).\n- driver core: Move async_synchronize_full call (bsc#1051510).\n- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).\n- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).\n- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).\n- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- drivers/sbus/char: add of_node_put() (bsc#1051510).\n- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).\n- drm/ast: Fix connector leak during driver unload (bsc#1051510).\n- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).\n- drm/atomic-helper: Complete fake_commit-\u003eflip_done potentially earlier (bsc#1051510).\n- drm: Block fb changes for async plane updates (bsc#1051510).\n- drm/bridge: tc358767: add defines for DP1_SRCCTRL \u0026 PHY_2LANE (bsc#1051510).\n- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).\n- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).\n- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).\n- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).\n- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n- drm: Clear state-\u003eacquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).\n- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).\n- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)\n- drm/etnaviv: potential NULL dereference (bsc#1113722)\n- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)\n- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)\n- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)\n- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n- drm/i915/gvt: Fix mmap range check (bsc#1120902)\n- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)\n- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).\n- drm/i915/opregion: fix version check (bsc#1113722)\n- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)\n- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)\n- drm/meson: add missing of_node_put (bsc#1051510).\n- drm/modes: Prevent division by zero htotal (bsc#1051510).\n- drm/msm: Fix error return checking (bsc#1051510).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).\n- drm/msm: Unblock writer if reader closes file (bsc#1051510).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)\n- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).\n- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)\n- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)\n- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).\n- drm/rockchip: fix for mailbox read size (bsc#1051510).\n- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)\n- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)\n- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)\n- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).\n- earlycon: Initialize port-\u003euartclk based on clock-frequency property (bsc#1051510).\n- earlycon: Remove hardcoded port-\u003euartclk initialization in of_setup_earlycon (bsc#1051510).\n- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).\n- enic: fix checksum validation for IPv6 (bsc#1051510).\n- esp6: fix memleak on error path in esp6_input (bsc#1051510).\n- esp: Fix locking on page fragment allocation (bsc#1051510).\n- esp: Fix memleaks on error paths (bsc#1051510).\n- esp: Fix skb tailroom calculation (bsc#1051510).\n- exportfs: do not read dentry after free (bsc#1051510).\n- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).\n- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).\n- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).\n- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).\n- fanotify: fix handling of events on child sub-directory (bsc#1122019).\n- fat: validate -\u003ei_start before using (bsc#1051510).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1113722)\n- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).\n- Fix kabi issues with new transport sharing code (bsc#1114893).\n- Fix problem with sharetransport= and NFSv4 (bsc#1114893).\n- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).\n- floppy: check_events callback should not return a negative number (bsc#1051510).\n- fork: do not copy inconsistent signal handler state to child (bsc#1051510).\n- fork: record start_time late (git-fixes).\n- fork: unconditionally clear stack on fork (git-fixes).\n- fs/cifs: require sha512 (bsc#1051510).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).\n- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).\n- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).\n- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).\n- fuse: handle zero sized retrieve correctly (bsc#1051510).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bsc#1051510).\n- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).\n- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).\n- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).\n- geneve, vxlan: Do not set exceptions if skb-\u003elen \u003c mtu (bsc#1123456).\n- genwqe: Fix size check (bsc#1051510).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bsc#1120601).\n- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).\n- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).\n- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).\n- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).\n- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).\n- gpio: pl061: handle failed allocations (bsc#1051510).\n- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).\n- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)\n- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).\n- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).\n- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).\n- hfs: do not free node before using (bsc#1051510).\n- hfsplus: do not free node before using (bsc#1051510).\n- hfsplus: prevent btree data loss on root split (bsc#1051510).\n- hfs: prevent btree data loss on root split (bsc#1051510).\n- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).\n- hpet: Fix missing \u0027=\u0027 character in the __setup() code of hpet_mmap_enable (git-fixes).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).\n- hv: v4.12 API for hyperv-iommu (bsc#1122822).\n- hwmon/k10temp: Add support for AMD family 17h, model 30h CPUs ().\n- hwmon/k10temp, x86/amd_nb: Consolidate shared device IDs ().\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).\n- hwmon: (lm80) fix a missing check of the status of smbus read (bsc#1051510).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).\n- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).\n- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).\n- i2c-axxia: check for error conditions first (bsc#1051510).\n- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).\n- i2c: cadence: Fix the hold bit setting (bsc#1051510).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).\n- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).\n- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).\n- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).\n- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).\n- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).\n- IB/core: Destroy QP if XRC QP fails (bsc#1046306).\n- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).\n- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).\n- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).\n- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- ide: pmac: add of_node_put() (bsc#1051510).\n- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).\n- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).\n- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).\n- iio: accel: kxcjk1013: Add KIOX010A acpi Hardware-ID (bsc#1051510).\n- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).\n- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).\n- input: bma150 - register input device after setting private data (bsc#1051510).\n- input: elan_i2c - add acpi ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).\n- input: elan_i2c - add acpi ID for touchpad in Lenovo V330-15ISK (bsc#1051510).\n- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).\n- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).\n- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).\n- input: raspberrypi-ts - fix link error (git-fixes).\n- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).\n- input: restore EV_ABS ABS_RESERVED (bsc#1051510).\n- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).\n- input: synaptics - enable smbus for HP EliteBook 840 G4 (bsc#1051510).\n- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).\n- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).\n- intel_th: Do not reference unassigned outputs (bsc#1051510).\n- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).\n- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).\n- iomap: warn on zero-length mappings (bsc#1127062).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).\n- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).\n- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).\n- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).\n- ipmi:pci: Blacklist a Realtek \u0027IPMI\u0027 device (git-fixes).\n- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).\n- ipsec: check return value of skb_to_sgvec always (bsc#1051510).\n- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).\n- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: addrlabel: per netns list (bsc#1122982).\n- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).\n- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).\n- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982). Refresh patches.suse/ip6_vti-fix-a-null-pointer-deference-when-destroy-vt.patch\n- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).\n- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).\n- ip: validate header length on virtual device xmit (networking-stable-19_01_04).\n- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).\n- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).\n- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).\n- iscsi target: fix session creation failure handling (bsc#1051510).\n- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).\n- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).\n- iser: set sector for ambiguous mr status errors (bsc#1051510).\n- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).\n- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).\n- iwlwifi: mvm: fix RSS config command (bsc#1051510).\n- iwlwifi: pcie: fix emergency path (bsc#1051510).\n- iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).\n- ixgbe: check return value of napi_complete_done() (bsc#1051510).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).\n- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).\n- kabi: fix xhci kABI stability (bsc#1119086).\n- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).\n- kabi: handle addition of uevent_sock into struct net (bsc#1122982).\n- kabi: Preserve kABI for dma_max_mapping_size() (bsc#1120008).\n- kabi: protect struct sctp_association (kabi).\n- kabi: protect struct smc_buf_desc (bnc#1117947, LTC#173662).\n- kabi: protect struct smc_link (bnc#1117947, LTC#173662).\n- kabi: protect vhost_log_write (kabi).\n- kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).\n- kABI workaround for bt_accept_enqueue() change (bsc#1051510).\n- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).\n- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).\n- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).\n- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).\n- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).\n- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).\n- keys: allow reaching the keys quotas exactly (bsc#1051510).\n- keys: Timestamp new keys (bsc#1051510).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).\n- kgdboc: Fix restrict error (bsc#1051510).\n- kgdboc: Fix warning with module build (bsc#1051510).\n- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).\n- kobject: copy env blob in one go (bsc#1122982).\n- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).\n- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).\n- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).\n- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).\n- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: fix L1TF\u0027s MMIO GFN calculation (bsc#1124204).\n- kvm: x86: Fix single-step debugging (bsc#1129295).\n- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).\n- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).\n- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).\n- lan78xx: Resolve issue with changing MAC address (bsc#1051510).\n- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).\n- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).\n- libceph: handle an empty authorize reply (bsc#1126789).\n- lib/div64.c: off by one in shift (bsc#1051510).\n- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).\n- libnvdimm/label: Clear \u0027updating\u0027 flag after label-set update (bsc#1129543).\n- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).\n- lib/rbtree-test: lower default params (git-fixes).\n- lightnvm: fail fast on passthrough commands (bsc#1125780).\n- livepatch: Change unsigned long old_addr -\u003e void *old_func in struct klp_func (bsc#1071995).\n- livepatch: Consolidate klp_free functions (bsc#1071995 ).\n- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).\n- livepatch: Define a macro for new API identification (bsc#1071995).\n- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).\n- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).\n- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).\n- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).\n- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).\n- livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).\n- livepatch: Send a fake signal periodically (bsc#1071995 ).\n- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).\n- livepatch: Simplify API by removing registration step (bsc#1071995).\n- llc: do not use sk_eat_skb() (bsc#1051510).\n- lockd: fix access beyond unterminated strings in prints (git-fixes).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: drop caches if offset or block_size are changed (bsc#1124975).\n- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).\n- LSM: Check for NULL cred-security on free (bsc#1051510).\n- mac80211: Add attribute aligned(2) to struct \u0027action\u0027 (bsc#1051510).\n- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).\n- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).\n- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).\n- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).\n- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).\n- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).\n- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).\n- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).\n- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).\n- media: s5k4ecgx: delete a bogus error message (bsc#1051510).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).\n- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).\n- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).\n- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).\n- media: uvcvideo: Fix \u0027type\u0027 check leading to overflow (bsc#1051510).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).\n- media: v4l2-tpg: array index could become negative (bsc#1051510).\n- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).\n- media: vb2: be sure to unlock mutex on errors (bsc#1051510).\n- media: vb2: vb2_mmap: move lock up (bsc#1051510).\n- media: vivid: fix error handling of kthread_run (bsc#1051510).\n- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).\n- media: vivid: set min width/height to a value \u003e 0 (bsc#1051510).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).\n- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).\n- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).\n- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).\n- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).\n- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).\n- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).\n- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).\n- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).\n- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).\n- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).\n- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).\n- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).\n- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).\n- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).\n- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).\n- misc: sram: enable clock before registering regions (bsc#1051510).\n- misc: sram: fix resource leaks in probe error path (bsc#1051510).\n- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).\n- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).\n- mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n- mlx4: trigger IB events needed by SMC (bnc#1117947, LTC#173662).\n- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).\n- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).\n- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).\n- mmap: relax file size limit for regular files (git fixes (mm/mmap)).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).\n- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).\n- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).\n- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).\n- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).\n- mmc: omap: fix the maximum timeout setting (bsc#1051510).\n- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).\n- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n- mmc: spi: Fix card detection during probe (bsc#1051510).\n- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).\n- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).\n- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).\n- mm/ksm.c: ignore STABLE_FLAG of rmap_item-\u003eaddress in rmap_walk_ksm() (git fixes (mm/ksm)).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).\n- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).\n- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)\n- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).\n- mm: migration: factor out code to compute expected number of page references (bsc#1084216).\n- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).\n- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).\n- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).\n- Moved patches.fixes/x86-add-tsx-force-abort-cpuid-msr.patch to patches.arch/ and added upstream tags (bsc#1129363) patches.arch/x86-add-tsx-force-abort-cpuid-msr\n- Move the upstreamed HD-audio fix into sorted section\n- mpt3sas: check sense buffer before copying sense data (bsc#1106811).\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).\n- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).\n- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).\n- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).\n- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).\n- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).\n- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).\n- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).\n- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).\n- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).\n- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).\n- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).\n- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).\n- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).\n- mtd: nand: ifc: update bufnum mask for ver \u003e= 2.0.0 (bsc#1051510).\n- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).\n- mtd: nand: omap2: Fix subpage write (bsc#1051510).\n- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).\n- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).\n- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).\n- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).\n- mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).\n- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).\n- mv88e6060: disable hardware level MAC learning (bsc#1051510).\n- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).\n- neighbour: Avoid writing before skb-\u003ehead in neigh_hh_output() (networking-stable-18_12_12).\n- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).\n- net: add uevent socket member (bsc#1122982).\n- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).\n- net: aquantia: fixed instack structure overflow (git-fixes).\n- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).\n- net: bcmgenet: abort suspend on error (bsc#1051510).\n- net: bcmgenet: code movement (bsc#1051510).\n- net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n- net: bcmgenet: return correct value \u0027ret\u0027 from bcmgenet_power_down (bsc#1051510).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).\n- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- net: do not call update_pmtu unconditionally (bsc#1123456).\n- net: Do not default Cavium PTP driver to \u0027y\u0027 (bsc#1110096).\n- net: dp83640: expire old TX-skb (networking-stable-19_02_10).\n- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).\n- net: ena: fix race between link up and device initalization (bsc#1083548).\n- netfilter: nf_tables: check the result of dereferencing base_chain-\u003estats (git-fixes).\n- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).\n- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).\n- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).\n- net: hns3: add handling for big TX fragment (bsc#1104353 ).\n- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).\n- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).\n- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).\n- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).\n- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).\n- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).\n- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).\n- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).\n- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).\n- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).\n- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).\n- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).\n- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).\n- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).\n- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).\n- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).\n- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Release resource on error flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).\n- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).\n- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).\n- netns: restrict uevents (bsc#1122982).\n- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).\n- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).\n- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).\n- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).\n- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).\n- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).\n- netrom: switch to sock timer API (bsc#1051510).\n- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).\n- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).\n- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).\n- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).\n- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).\n- net/smc: abort CLC connection in smc_release (bnc#1117947, LTC#173662).\n- net/smc: add infrastructure to send delete rkey messages (bnc#1117947, LTC#173662).\n- net/smc: add SMC-D shutdown signal (bnc#1117947, LTC#173662).\n- net/smc: allow fallback after clc timeouts (bnc#1117947, LTC#173662).\n- net/smc: atomic SMCD cursor handling (bnc#1117947, LTC#173662).\n- net/smc: avoid a delay by waiting for nothing (bnc#1117947, LTC#173662).\n- net/smc: cleanup listen worker mutex unlocking (bnc#1117947, LTC#173662).\n- net/smc: cleanup tcp_listen_worker initialization (bnc#1117947, LTC#173662).\n- net/smc: enable fallback for connection abort in state INIT (bnc#1117947, LTC#173662).\n- net/smc: fix non-blocking connect problem (bnc#1117947, LTC#173662).\n- net/smc: fix sizeof to int comparison (bnc#1117947, LTC#173662).\n- net/smc: fix smc_buf_unuse to use the lgr pointer (bnc#1117947, LTC#173662).\n- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).\n- net/smc: make smc_lgr_free() static (bnc#1117947, LTC#173662).\n- net/smc: no link delete for a never active link (bnc#1117947, LTC#173662).\n- net/smc: no urgent data check for listen sockets (bnc#1117947, LTC#173662).\n- net/smc: remove duplicate mutex_unlock (bnc#1117947, LTC#173662).\n- net/smc: remove sock_error detour in clc-functions (bnc#1117947, LTC#173662).\n- net/smc: short wait for late smc_clc_wait_msg (bnc#1117947, LTC#173662).\n- net/smc: unregister rkeys of unused buffer (bnc#1117947, LTC#173662).\n- net/smc: use after free fix in smc_wr_tx_put_slot() (bnc#1117947, LTC#173662).\n- net/smc: use queue pair number when matching link group (bnc#1117947, LTC#173662).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).\n- net: stmmac: Fix PCI module removal leak (git-fixes).\n- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).\n- net: stmmac: Use mutex instead of spinlock (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).\n- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).\n- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).\n- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).\n- nfit: acpi_nfit_ctl(): Check out_obj-\u003etype in the right place (bsc#1129547).\n- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).\n- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).\n- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n- nfs: Allow NFSv4 mounts to not share transports ().\n- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).\n- nfsd: Fix an Oops in free_session() (git-fixes).\n- nfs: Fix a missed page unlock after pg_doio() (git-fixes).\n- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).\n- nfs: support \u0027nosharetransport\u0027 option (bnc#807502, bnc#828192, ).\n- nfsv4.1: Fix the r/wsize checking (git-fixes).\n- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).\n- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).\n- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).\n- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).\n- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).\n- nvme: kABI fix for scan_lock (bsc#1123882).\n- nvme: lock NS list changes while handling command effects (bsc#1123882).\n- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).\n- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).\n- nvme-multipath: round-robin I/O policy (bsc#1110705).\n- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).\n- of, numa: Validate some distance map rules (bsc#1051510).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).\n- omap2fb: Fix stack memory disclosure (bsc#1120902)\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).\n- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).\n- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).\n- packet: Do not leak dev refcounts on error exit (git-fixes).\n- packet: validate address length if non-zero (networking-stable-19_01_04).\n- packet: validate address length (networking-stable-19_01_04).\n- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).\n- Partially revert \u0027block: fail op_is_write() requests to (bsc#1125252).\n- PCI: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).\n- PCI: Disable broken RTIT_BAR of Intel TH (bsc#1120318).\n- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).\n- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).\n- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).\n- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).\n- pcrypt: use format specifier in kobject_add (bsc#1051510).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).\n- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).\n- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).\n- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).\n- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).\n- phy: tegra: remove redundant self assignment of \u0027map\u0027 (bsc#1051510).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bsc#1051510).\n- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).\n- pinctrl: meson: fix pull enable register calculation (bsc#1051510).\n- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).\n- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).\n- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).\n- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).\n- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).\n- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).\n- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).\n- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).\n- powerpc: Add an option to disable static PCI bus numbering (bsc#1122159).\n- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).\n- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).\n- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).\n- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).\n- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).\n- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).\n- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).\n- powerpc/tm: Fix comment (bsc#1118338).\n- powerpc/tm: Fix endianness flip on trap (bsc#1118338).\n- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).\n- powerpc/tm: Fix HTM documentation (bsc#1118338).\n- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).\n- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).\n- powerpc/tm: Print 64-bits MSR (bsc#1118338).\n- powerpc/tm: Print scratch value (bsc#1118338).\n- powerpc/tm: Reformat comments (bsc#1118338).\n- powerpc/tm: Remove msr_tm_active() (bsc#1118338).\n- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).\n- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).\n- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).\n- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).\n- powerpc/tm: Update function prototype comment (bsc#1118338).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).\n- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).\n- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).\n- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).\n- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).\n- ptp_kvm: probe for kvm guest availability (bsc#1098382).\n- ptr_ring: wrap back -\u003eproducer in __ptr_ring_swap_queue() (networking-stable-19_01_04).\n- Put the xhci fix patch to the right place in the sorted section\n- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).\n- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).\n- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).\n- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).\n- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).\n- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).\n- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).\n- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).\n- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).\n- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).\n- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).\n- rdma/core: Fix unwinding flow in case of error to register device (bsc#1046306).\n- rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).\n- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).\n- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).\n- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).\n- Remove blacklist of virtio patch so we can install it (bsc#1114585)\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1051510).\n- Revert \u0027input: elan_i2c - add acpi ID for touchpad in ASUS Aspire F5-573G\u0027 (bsc#1051510).\n- Revert \u0027openvswitch: Fix template leak in error cases.\u0027 (bsc#1051510).\n- Revert \u0027scsi: qla2xxx: Fix NVMe Target discovery\u0027 (bsc#1125252).\n- Revert \u0027serial: 8250: Fix clearing FIFOs in RS485 mode again\u0027 (bsc#1051510).\n- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.\n- Revert \u0027xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue\u0027 (bsc#1120854).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).\n- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697) dracut has been using permissions 0600 for the initrd for a long time.\n- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)\n- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).\n- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).\n- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).\n- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).\n- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).\n- s390/early: improve machine detection (git-fixes).\n- s390/ism: clear dmbe_mask bit before SMC IRQ handling (bnc#1117947, LTC#173662).\n- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).\n- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).\n- s390/qeth: fix use-after-free in error path (bsc#1127534).\n- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).\n- s390/sthyi: Fix machine name validity indication (git-fixes).\n- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).\n- sata_rcar: fix deferred probing (bsc#1051510).\n- sbus: char: add of_node_put() (bsc#1051510).\n- sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).\n- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- sch_multiq: fix double free on init failure (bsc#1051510).\n- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).\n- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).\n- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).\n- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).\n- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).\n- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).\n- scsi: lpfc: fix remoteport access (bsc#1125252).\n- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).\n- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).\n- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).\n- scsi: mpt3sas: Add ioc_\u003clevel\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u003clevel\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u003clevel\u003e with MPT3SAS_FMT to ioc_\u003clevel\u003e (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).\n- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).\n- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).\n- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).\n- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).\n- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).\n- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).\n- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).\n- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).\n- scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).\n- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).\n- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).\n- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).\n- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).\n- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).\n- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).\n- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).\n- sctp: kfree_rcu asoc (networking-stable-18_12_12).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).\n- selftests/livepatch: introduce tests (bsc#1071995).\n- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).\n- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).\n- selinux: always allow mounting submounts (bsc#1051510).\n- selinux: fix GPF on invalid policy (bsc#1051510).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).\n- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).\n- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).\n- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).\n- serial: imx: fix error handling in console_setup (bsc#1051510).\n- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).\n- serial/sunsu: fix refcount leak (bsc#1051510).\n- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).\n- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).\n- signal: Always deliver the kernel\u0027s SIGKILL and SIGSTOP to a pid namespace init (git-fixes).\n- skge: potential memory corruption in skge_get_regs() (bsc#1051510).\n- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).\n- sky2: Increase D3 delay again (bsc#1051510).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).\n- smb3.1.1 dialect is no longer experimental (bsc#1051510).\n- smb311: Fix reconnect (bsc#1051510).\n- smb311: Improve checking of negotiate security contexts (bsc#1051510).\n- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).\n- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).\n- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).\n- smb3: check for and properly advertise directory lease support (bsc#1051510).\n- smb3: directory sync should not return an error (bsc#1051510).\n- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).\n- smb3: do not request leases in symlink creation and query (bsc#1051510).\n- smb3: Do not send smb3 SET_INFO if nothing changed (bsc#1051510).\n- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).\n- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).\n- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).\n- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).\n- smb3: fix various xid leaks (bsc#1051510).\n- smb3: Improve security, move default dialect to smb3 from old CIFS (bsc#1051510).\n- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).\n- smb3: Remove ifdef since smb3 (and later) now STRONGLY preferred (bsc#1051510).\n- smb3: remove noisy warning message on mount (bsc#1129664).\n- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).\n- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).\n- soc/tegra: Do not leak device tree node reference (bsc#1051510).\n- splice: do not merge into linked buffers (git-fixes).\n- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).\n- staging: iio: ad7780: update voltage on read (bsc#1051510).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).\n- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).\n- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).\n- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).\n- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).\n- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).\n- staging: speakup: Replace strncpy with memcpy (bsc#1051510).\n- staging: wilc1000: fix to set correct value for \u0027vif_num\u0027 (bsc#1051510).\n- sunrpc: correct the computation for page_ptr when truncating (git-fixes).\n- sunrpc: Fix a potential race in xprt_connect() (git-fixes).\n- sunrpc: Fix leak of krb5p encode pages (git-fixes).\n- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).\n- sunrpc: safely reallow resvport min/max inversion (git-fixes).\n- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).\n- swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).\n- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).\n- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).\n- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).\n- tcp: batch tcp_net_metrics_exit (bsc#1122982).\n- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).\n- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).\n- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).\n- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).\n- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).\n- tcp: lack of available data can also cause TSO defer (git-fixes).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).\n- team: Free BPF filter when unregistering netdev (bsc#1051510).\n- thermal: do not clear passive state during system sleep (bsc#1051510).\n- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).\n- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).\n- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).\n- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).\n- thermal: mediatek: fix register index error (bsc#1051510).\n- timekeeping: Use proper seqcount initializer (bsc#1051510).\n- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).\n- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).\n- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).\n- tipc: fix a double kfree_skb() (networking-stable-19_01_04).\n- tipc: fix a race condition of releasing subscriber object (bsc#1051510).\n- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).\n- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).\n- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).\n- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).\n- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).\n- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).\n- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).\n- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).\n- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).\n- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).\n- Tree connect for smb3.1.1 must be signed for non-encrypted shares (bsc#1051510).\n- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).\n- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).\n- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).\n- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).\n- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).\n- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).\n- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).\n- uevent: add alloc_uevent_skb() helper (bsc#1122982).\n- Update config files. Remove conditional support for smb2 and SMB3:\n- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).\n- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).\n- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.\n- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).\n- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).\n- usb: Add new USB LPM helpers (bsc#1120902).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).\n- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).\n- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).\n- usb: dwc3: gadget: Clear req-\u003eneeds_extra_trb flag on cleanup (bsc#1120902).\n- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).\n- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).\n- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).\n- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).\n- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).\n- usb: musb: dsps: fix otg state machine (bsc#1051510).\n- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).\n- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).\n- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n- usb: phy: am335x: fix race condition in _probe (bsc#1051510).\n- usb: serial: option: add Fibocom NL678 series (bsc#1120902).\n- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).\n- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).\n- usb: storage: add quirk for SMI SM3350 (bsc#1120902).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).\n- usb: xhci: fix \u0027broken_suspend\u0027 placement in struct xchi_hcd (bsc#1119086).\n- veth: set peer GSO values (bsc#1051510).\n- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n- vfio: ccw: process ssch with interrupts disabled (git-fixes).\n- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).\n- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).\n- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).\n- vhost: log dirty page correctly (networking-stable-19_01_26).\n- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).\n- vhost/vsock: fix uninitialized vhost_vsock-\u003eguest_cid (bsc#1051510).\n- video: clps711x-fb: release disp device node in probe() (bsc#1051510).\n- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).\n- virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).\n- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).\n- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).\n- virtio/s390: avoid race on vcdev-\u003econfig (git-fixes).\n- virtio/s390: fix race in ccw_io_helper() (git-fixes).\n- vmci: Support upto 64-bit PPNs (bsc#1127286).\n- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).\n- vsock: Send reset control packet when socket is partially bound (networking-stable-19_01_04).\n- vt: invoke notifier on screen size change (bsc#1051510).\n- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).\n- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling gro_cells_receive() (git-fixes).\n- vxlan: update skb dst pmtu on tx path (bsc#1123456).\n- w90p910_ether: remove incorrect __init annotation (bsc#1051510).\n- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).\n- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/amd_nb: Add PCI device IDs for family 17h, model 30h ().\n- x86/amd_nb: Add support for newer PCI topologies ().\n- x86/a.out: Clear the dump structure initially (bsc#1114279).\n- x86/apic: Provide apic_ack_irq() (bsc#1122822).\n- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).\n- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).\n- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).\n- x86/bugs: Add AMD\u0027s variant of SSB_NO (bsc#1114279).\n- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).\n- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).\n- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).\n- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).\n- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).\n- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).\n- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).\n- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).\n- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).\n- x86/vdso: Remove obsolete \u0027fake section table\u0027 reservation (bsc#1114279).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).\n- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).\n- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: fix dom0 boot on huge systems (bsc#1127836).\n- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).\n- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).\n- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).\n- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).\n- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).\n- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).\n- Yama: Check for pid death before checking ancestry (bsc#1051510).\n- yam: fix a missing-check bug (bsc#1051510).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).\n- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-765,SUSE-SLE-DESKTOP-12-SP4-2019-765,SUSE-SLE-HA-12-SP4-2019-765,SUSE-SLE-Live-Patching-12-SP4-2019-765,SUSE-SLE-SDK-12-SP4-2019-765,SUSE-SLE-SERVER-12-SP4-2019-765,SUSE-SLE-WE-12-SP4-2019-765", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0765-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0765-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190765-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0765-1", "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005240.html" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050252", "url": "https://bugzilla.suse.com/1050252" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1054610", "url": "https://bugzilla.suse.com/1054610" }, { "category": "self", "summary": "SUSE Bug 1055121", "url": "https://bugzilla.suse.com/1055121" }, { "category": "self", "summary": "SUSE Bug 1056658", "url": "https://bugzilla.suse.com/1056658" }, { "category": "self", "summary": "SUSE Bug 1056662", "url": "https://bugzilla.suse.com/1056662" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1063638", "url": "https://bugzilla.suse.com/1063638" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1068032", "url": "https://bugzilla.suse.com/1068032" }, { "category": "self", "summary": "SUSE Bug 1070995", "url": "https://bugzilla.suse.com/1070995" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1074562", "url": "https://bugzilla.suse.com/1074562" }, { "category": "self", "summary": "SUSE Bug 1074578", "url": "https://bugzilla.suse.com/1074578" }, { "category": "self", "summary": "SUSE Bug 1074701", "url": "https://bugzilla.suse.com/1074701" }, { "category": "self", "summary": "SUSE Bug 1075006", "url": "https://bugzilla.suse.com/1075006" }, { "category": "self", "summary": "SUSE Bug 1075419", "url": "https://bugzilla.suse.com/1075419" }, { "category": "self", "summary": "SUSE Bug 1075748", "url": "https://bugzilla.suse.com/1075748" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1080039", "url": "https://bugzilla.suse.com/1080039" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1084216", "url": "https://bugzilla.suse.com/1084216" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087084", "url": "https://bugzilla.suse.com/1087084" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1087939", "url": "https://bugzilla.suse.com/1087939" }, { "category": "self", "summary": "SUSE Bug 1088133", "url": "https://bugzilla.suse.com/1088133" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098382", "url": "https://bugzilla.suse.com/1098382" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1102055", "url": "https://bugzilla.suse.com/1102055" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106434", "url": "https://bugzilla.suse.com/1106434" }, { "category": "self", "summary": "SUSE Bug 1106811", "url": "https://bugzilla.suse.com/1106811" }, { "category": "self", "summary": "SUSE Bug 1107078", "url": "https://bugzilla.suse.com/1107078" }, { "category": "self", "summary": "SUSE Bug 1107665", "url": "https://bugzilla.suse.com/1107665" }, { "category": "self", "summary": "SUSE Bug 1108101", "url": "https://bugzilla.suse.com/1108101" }, { "category": "self", "summary": "SUSE Bug 1108870", "url": "https://bugzilla.suse.com/1108870" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1110096", "url": "https://bugzilla.suse.com/1110096" }, { "category": "self", "summary": "SUSE Bug 1110705", "url": "https://bugzilla.suse.com/1110705" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1113042", "url": "https://bugzilla.suse.com/1113042" }, { "category": "self", "summary": "SUSE Bug 1113712", "url": "https://bugzilla.suse.com/1113712" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113769", "url": "https://bugzilla.suse.com/1113769" }, { "category": "self", "summary": "SUSE Bug 1113939", "url": "https://bugzilla.suse.com/1113939" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114585", "url": "https://bugzilla.suse.com/1114585" }, { "category": "self", "summary": "SUSE Bug 1114893", "url": "https://bugzilla.suse.com/1114893" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117155", "url": "https://bugzilla.suse.com/1117155" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1117947", "url": "https://bugzilla.suse.com/1117947" }, { "category": "self", "summary": "SUSE Bug 1118338", "url": "https://bugzilla.suse.com/1118338" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119086", "url": "https://bugzilla.suse.com/1119086" }, { "category": "self", "summary": "SUSE Bug 1119766", "url": "https://bugzilla.suse.com/1119766" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120008", "url": "https://bugzilla.suse.com/1120008" }, { "category": "self", "summary": "SUSE Bug 1120318", "url": "https://bugzilla.suse.com/1120318" }, { "category": "self", "summary": "SUSE Bug 1120601", "url": "https://bugzilla.suse.com/1120601" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120854", "url": "https://bugzilla.suse.com/1120854" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1120909", "url": "https://bugzilla.suse.com/1120909" }, { "category": "self", "summary": "SUSE Bug 1120955", "url": "https://bugzilla.suse.com/1120955" }, { "category": "self", "summary": "SUSE Bug 1121317", "url": "https://bugzilla.suse.com/1121317" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1121789", "url": "https://bugzilla.suse.com/1121789" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122019", "url": "https://bugzilla.suse.com/1122019" }, { "category": "self", "summary": "SUSE Bug 1122159", "url": "https://bugzilla.suse.com/1122159" }, { "category": "self", "summary": "SUSE Bug 1122192", "url": "https://bugzilla.suse.com/1122192" }, { "category": "self", "summary": "SUSE Bug 1122292", "url": "https://bugzilla.suse.com/1122292" }, { "category": "self", "summary": "SUSE Bug 1122324", "url": "https://bugzilla.suse.com/1122324" }, { "category": "self", "summary": "SUSE Bug 1122554", "url": "https://bugzilla.suse.com/1122554" }, { "category": "self", "summary": "SUSE Bug 1122662", "url": "https://bugzilla.suse.com/1122662" }, { "category": "self", "summary": "SUSE Bug 1122764", "url": "https://bugzilla.suse.com/1122764" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122822", "url": "https://bugzilla.suse.com/1122822" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1122927", "url": "https://bugzilla.suse.com/1122927" }, { "category": "self", "summary": "SUSE Bug 1122944", "url": "https://bugzilla.suse.com/1122944" }, { "category": "self", "summary": "SUSE Bug 1122971", "url": "https://bugzilla.suse.com/1122971" }, { "category": "self", "summary": "SUSE Bug 1122982", "url": "https://bugzilla.suse.com/1122982" }, { "category": "self", "summary": "SUSE Bug 1123060", "url": "https://bugzilla.suse.com/1123060" }, { "category": "self", "summary": "SUSE Bug 1123061", "url": "https://bugzilla.suse.com/1123061" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1123317", "url": "https://bugzilla.suse.com/1123317" }, { "category": "self", "summary": "SUSE Bug 1123348", "url": "https://bugzilla.suse.com/1123348" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE Bug 1123456", "url": "https://bugzilla.suse.com/1123456" }, { "category": "self", "summary": "SUSE Bug 1123538", "url": "https://bugzilla.suse.com/1123538" }, { "category": "self", "summary": "SUSE Bug 1123697", "url": "https://bugzilla.suse.com/1123697" }, { "category": "self", "summary": "SUSE Bug 1123882", "url": "https://bugzilla.suse.com/1123882" }, { "category": "self", "summary": "SUSE Bug 1123933", "url": "https://bugzilla.suse.com/1123933" }, { "category": "self", "summary": "SUSE Bug 1124055", "url": "https://bugzilla.suse.com/1124055" }, { "category": "self", "summary": "SUSE Bug 1124204", "url": "https://bugzilla.suse.com/1124204" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124579", "url": "https://bugzilla.suse.com/1124579" }, { "category": "self", "summary": "SUSE Bug 1124589", "url": "https://bugzilla.suse.com/1124589" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1124969", "url": "https://bugzilla.suse.com/1124969" }, { "category": "self", "summary": "SUSE Bug 1124974", "url": "https://bugzilla.suse.com/1124974" }, { "category": "self", "summary": "SUSE Bug 1124975", "url": "https://bugzilla.suse.com/1124975" }, { "category": "self", "summary": "SUSE Bug 1124976", "url": "https://bugzilla.suse.com/1124976" }, { "category": "self", "summary": "SUSE Bug 1124978", "url": "https://bugzilla.suse.com/1124978" }, { "category": "self", "summary": "SUSE Bug 1124979", "url": "https://bugzilla.suse.com/1124979" }, { "category": "self", "summary": "SUSE Bug 1124980", "url": "https://bugzilla.suse.com/1124980" }, { "category": "self", "summary": "SUSE Bug 1124981", "url": "https://bugzilla.suse.com/1124981" }, { "category": "self", "summary": "SUSE Bug 1124982", "url": "https://bugzilla.suse.com/1124982" }, { "category": "self", "summary": "SUSE Bug 1124984", "url": "https://bugzilla.suse.com/1124984" }, { "category": "self", "summary": "SUSE Bug 1124985", "url": "https://bugzilla.suse.com/1124985" }, { "category": "self", "summary": "SUSE Bug 1125109", "url": "https://bugzilla.suse.com/1125109" }, { "category": "self", "summary": "SUSE Bug 1125125", "url": "https://bugzilla.suse.com/1125125" }, { "category": "self", "summary": "SUSE Bug 1125252", "url": "https://bugzilla.suse.com/1125252" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125614", "url": "https://bugzilla.suse.com/1125614" }, { "category": "self", "summary": "SUSE Bug 1125728", "url": "https://bugzilla.suse.com/1125728" }, { "category": "self", "summary": "SUSE Bug 1125780", "url": "https://bugzilla.suse.com/1125780" }, { "category": "self", "summary": "SUSE Bug 1125797", "url": "https://bugzilla.suse.com/1125797" }, { "category": "self", "summary": "SUSE Bug 1125799", "url": "https://bugzilla.suse.com/1125799" }, { "category": "self", "summary": "SUSE Bug 1125800", "url": "https://bugzilla.suse.com/1125800" }, { "category": "self", "summary": "SUSE Bug 1125907", "url": "https://bugzilla.suse.com/1125907" }, { "category": "self", "summary": "SUSE Bug 1125947", "url": "https://bugzilla.suse.com/1125947" }, { "category": "self", "summary": "SUSE Bug 1126131", "url": "https://bugzilla.suse.com/1126131" }, { "category": "self", "summary": "SUSE Bug 1126209", "url": "https://bugzilla.suse.com/1126209" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126393", "url": "https://bugzilla.suse.com/1126393" }, { "category": "self", "summary": "SUSE Bug 1126476", "url": "https://bugzilla.suse.com/1126476" }, { "category": "self", "summary": "SUSE Bug 1126480", "url": "https://bugzilla.suse.com/1126480" }, { "category": "self", "summary": "SUSE Bug 1126481", "url": "https://bugzilla.suse.com/1126481" }, { "category": "self", "summary": "SUSE Bug 1126488", "url": "https://bugzilla.suse.com/1126488" }, { "category": "self", "summary": "SUSE Bug 1126495", "url": "https://bugzilla.suse.com/1126495" }, { "category": "self", "summary": "SUSE Bug 1126555", "url": "https://bugzilla.suse.com/1126555" }, { "category": "self", "summary": "SUSE Bug 1126579", "url": "https://bugzilla.suse.com/1126579" }, { "category": "self", "summary": "SUSE Bug 1126789", "url": "https://bugzilla.suse.com/1126789" }, { "category": "self", "summary": "SUSE Bug 1126790", "url": "https://bugzilla.suse.com/1126790" }, { "category": "self", "summary": "SUSE Bug 1126802", "url": "https://bugzilla.suse.com/1126802" }, { "category": "self", "summary": "SUSE Bug 1126803", "url": "https://bugzilla.suse.com/1126803" }, { "category": "self", "summary": "SUSE Bug 1126804", "url": "https://bugzilla.suse.com/1126804" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1126806", "url": "https://bugzilla.suse.com/1126806" }, { "category": "self", "summary": "SUSE Bug 1126807", "url": "https://bugzilla.suse.com/1126807" }, { "category": "self", "summary": "SUSE Bug 1127042", "url": "https://bugzilla.suse.com/1127042" }, { "category": "self", "summary": "SUSE Bug 1127062", "url": "https://bugzilla.suse.com/1127062" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127154", "url": "https://bugzilla.suse.com/1127154" }, { "category": "self", "summary": "SUSE Bug 1127285", "url": "https://bugzilla.suse.com/1127285" }, { "category": "self", "summary": "SUSE Bug 1127286", "url": "https://bugzilla.suse.com/1127286" }, { "category": "self", "summary": "SUSE Bug 1127307", "url": "https://bugzilla.suse.com/1127307" }, { "category": "self", "summary": "SUSE Bug 1127363", "url": "https://bugzilla.suse.com/1127363" }, { "category": "self", "summary": "SUSE Bug 1127493", "url": "https://bugzilla.suse.com/1127493" }, { "category": "self", "summary": "SUSE Bug 1127494", "url": "https://bugzilla.suse.com/1127494" }, { "category": "self", "summary": "SUSE Bug 1127495", "url": "https://bugzilla.suse.com/1127495" }, { "category": "self", "summary": "SUSE Bug 1127496", "url": "https://bugzilla.suse.com/1127496" }, { "category": "self", "summary": "SUSE Bug 1127497", "url": "https://bugzilla.suse.com/1127497" }, { "category": "self", "summary": "SUSE Bug 1127498", "url": "https://bugzilla.suse.com/1127498" }, { "category": "self", "summary": "SUSE Bug 1127534", "url": "https://bugzilla.suse.com/1127534" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127567", "url": "https://bugzilla.suse.com/1127567" }, { "category": "self", "summary": "SUSE Bug 1127595", "url": "https://bugzilla.suse.com/1127595" }, { "category": "self", "summary": "SUSE Bug 1127603", "url": "https://bugzilla.suse.com/1127603" }, { "category": "self", "summary": "SUSE Bug 1127682", "url": "https://bugzilla.suse.com/1127682" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127750", "url": "https://bugzilla.suse.com/1127750" }, { "category": "self", "summary": "SUSE Bug 1127836", "url": "https://bugzilla.suse.com/1127836" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128094", "url": "https://bugzilla.suse.com/1128094" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128351", "url": "https://bugzilla.suse.com/1128351" }, { "category": "self", "summary": "SUSE Bug 1128451", "url": "https://bugzilla.suse.com/1128451" }, { "category": "self", "summary": "SUSE Bug 1128895", "url": "https://bugzilla.suse.com/1128895" }, { "category": "self", "summary": "SUSE Bug 1129046", "url": "https://bugzilla.suse.com/1129046" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129163", "url": "https://bugzilla.suse.com/1129163" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129181", "url": "https://bugzilla.suse.com/1129181" }, { "category": "self", "summary": "SUSE Bug 1129182", "url": "https://bugzilla.suse.com/1129182" }, { "category": "self", "summary": "SUSE Bug 1129183", "url": "https://bugzilla.suse.com/1129183" }, { "category": "self", "summary": "SUSE Bug 1129184", "url": "https://bugzilla.suse.com/1129184" }, { "category": "self", "summary": "SUSE Bug 1129205", "url": "https://bugzilla.suse.com/1129205" }, { "category": "self", "summary": "SUSE Bug 1129281", "url": "https://bugzilla.suse.com/1129281" }, { "category": "self", "summary": "SUSE Bug 1129284", "url": "https://bugzilla.suse.com/1129284" }, { "category": "self", "summary": "SUSE Bug 1129285", "url": "https://bugzilla.suse.com/1129285" }, { "category": "self", "summary": "SUSE Bug 1129291", "url": "https://bugzilla.suse.com/1129291" }, { "category": "self", "summary": "SUSE Bug 1129292", "url": "https://bugzilla.suse.com/1129292" }, { "category": "self", "summary": "SUSE Bug 1129293", "url": "https://bugzilla.suse.com/1129293" }, { "category": "self", "summary": "SUSE Bug 1129294", "url": "https://bugzilla.suse.com/1129294" }, { "category": "self", "summary": "SUSE Bug 1129295", "url": "https://bugzilla.suse.com/1129295" }, { "category": "self", "summary": "SUSE Bug 1129296", "url": "https://bugzilla.suse.com/1129296" }, { "category": "self", "summary": "SUSE Bug 1129326", "url": "https://bugzilla.suse.com/1129326" }, { "category": "self", "summary": "SUSE Bug 1129327", "url": "https://bugzilla.suse.com/1129327" }, { "category": "self", "summary": "SUSE Bug 1129330", "url": "https://bugzilla.suse.com/1129330" }, { "category": "self", "summary": "SUSE Bug 1129363", "url": "https://bugzilla.suse.com/1129363" }, { "category": "self", "summary": "SUSE Bug 1129366", "url": "https://bugzilla.suse.com/1129366" }, { "category": "self", "summary": "SUSE Bug 1129497", "url": "https://bugzilla.suse.com/1129497" }, { "category": "self", "summary": "SUSE Bug 1129519", "url": "https://bugzilla.suse.com/1129519" }, { "category": "self", "summary": "SUSE Bug 1129543", "url": "https://bugzilla.suse.com/1129543" }, { "category": "self", "summary": "SUSE Bug 1129547", "url": "https://bugzilla.suse.com/1129547" }, { "category": "self", "summary": "SUSE Bug 1129551", "url": "https://bugzilla.suse.com/1129551" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129625", "url": "https://bugzilla.suse.com/1129625" }, { "category": "self", "summary": "SUSE Bug 1129664", "url": "https://bugzilla.suse.com/1129664" }, { "category": "self", "summary": "SUSE Bug 1129739", "url": "https://bugzilla.suse.com/1129739" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 807502", "url": "https://bugzilla.suse.com/807502" }, { "category": "self", "summary": "SUSE Bug 824948", "url": "https://bugzilla.suse.com/824948" }, { "category": "self", "summary": "SUSE Bug 828192", "url": "https://bugzilla.suse.com/828192" }, { "category": "self", "summary": "SUSE Bug 925178", "url": "https://bugzilla.suse.com/925178" }, { "category": "self", "summary": "SUSE CVE CVE-2017-5753 page", "url": "https://www.suse.com/security/cve/CVE-2017-5753/" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20669 page", "url": "https://www.suse.com/security/cve/CVE-2018-20669/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7308 page", "url": "https://www.suse.com/security/cve/CVE-2019-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8980 page", "url": "https://www.suse.com/security/cve/CVE-2019-8980/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-03-26T17:00:55Z", "generator": { "date": "2019-03-26T17:00:55Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0765-1", "initial_release_date": "2019-03-26T17:00:55Z", "revision_history": [ { "date": "2019-03-26T17:00:55Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.13.1.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.13.1.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-95.13.1.aarch64", "product_id": "dlm-kmp-default-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-al-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-al-4.12.14-95.13.1.aarch64", "product_id": "dtb-al-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-allwinner-4.12.14-95.13.1.aarch64", "product_id": "dtb-allwinner-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-altera-4.12.14-95.13.1.aarch64", "product_id": "dtb-altera-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-amd-4.12.14-95.13.1.aarch64", "product_id": "dtb-amd-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-amlogic-4.12.14-95.13.1.aarch64", "product_id": "dtb-amlogic-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-apm-4.12.14-95.13.1.aarch64", "product_id": "dtb-apm-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-arm-4.12.14-95.13.1.aarch64", "product_id": "dtb-arm-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-broadcom-4.12.14-95.13.1.aarch64", "product_id": "dtb-broadcom-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-cavium-4.12.14-95.13.1.aarch64", "product_id": "dtb-cavium-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-exynos-4.12.14-95.13.1.aarch64", "product_id": "dtb-exynos-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-freescale-4.12.14-95.13.1.aarch64", "product_id": "dtb-freescale-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-hisilicon-4.12.14-95.13.1.aarch64", "product_id": "dtb-hisilicon-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-lg-4.12.14-95.13.1.aarch64", "product_id": "dtb-lg-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-marvell-4.12.14-95.13.1.aarch64", "product_id": "dtb-marvell-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-mediatek-4.12.14-95.13.1.aarch64", "product_id": "dtb-mediatek-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-nvidia-4.12.14-95.13.1.aarch64", "product_id": "dtb-nvidia-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-qcom-4.12.14-95.13.1.aarch64", "product_id": "dtb-qcom-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-renesas-4.12.14-95.13.1.aarch64", "product_id": "dtb-renesas-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-rockchip-4.12.14-95.13.1.aarch64", "product_id": "dtb-rockchip-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-socionext-4.12.14-95.13.1.aarch64", "product_id": "dtb-socionext-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-sprd-4.12.14-95.13.1.aarch64", "product_id": "dtb-sprd-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-xilinx-4.12.14-95.13.1.aarch64", "product_id": "dtb-xilinx-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-4.12.14-95.13.1.aarch64", "product": { "name": "dtb-zte-4.12.14-95.13.1.aarch64", "product_id": "dtb-zte-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.13.1.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-95.13.1.aarch64", "product_id": "gfs2-kmp-default-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-default-4.12.14-95.13.1.aarch64", "product_id": "kernel-default-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-default-base-4.12.14-95.13.1.aarch64", "product_id": "kernel-default-base-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-default-devel-4.12.14-95.13.1.aarch64", "product_id": "kernel-default-devel-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-default-extra-4.12.14-95.13.1.aarch64", "product_id": "kernel-default-extra-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-default-kgraft-4.12.14-95.13.1.aarch64", "product_id": "kernel-default-kgraft-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-obs-build-4.12.14-95.13.1.aarch64", "product_id": "kernel-obs-build-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-95.13.1.aarch64", "product_id": "kernel-obs-qa-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-syms-4.12.14-95.13.1.aarch64", "product_id": "kernel-syms-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-vanilla-4.12.14-95.13.1.aarch64", "product_id": "kernel-vanilla-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-95.13.1.aarch64", "product_id": "kernel-vanilla-base-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.13.1.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.13.1.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.13.1.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-95.13.1.aarch64", "product_id": "kselftests-kmp-default-4.12.14-95.13.1.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.13.1.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-95.13.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-95.13.1.noarch", "product": { "name": "kernel-devel-4.12.14-95.13.1.noarch", "product_id": "kernel-devel-4.12.14-95.13.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-95.13.1.noarch", "product": { "name": "kernel-docs-4.12.14-95.13.1.noarch", "product_id": "kernel-docs-4.12.14-95.13.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-95.13.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-95.13.1.noarch", "product_id": "kernel-docs-html-4.12.14-95.13.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-95.13.1.noarch", "product": { "name": "kernel-macros-4.12.14-95.13.1.noarch", "product_id": "kernel-macros-4.12.14-95.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-95.13.1.noarch", "product": { "name": "kernel-source-4.12.14-95.13.1.noarch", "product_id": "kernel-source-4.12.14-95.13.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-95.13.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-95.13.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-95.13.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.12.14-95.13.1.ppc64le", "product_id": "cluster-md-kmp-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "dlm-kmp-debug-4.12.14-95.13.1.ppc64le", "product_id": "dlm-kmp-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.13.1.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-95.13.1.ppc64le", "product_id": "dlm-kmp-default-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "gfs2-kmp-debug-4.12.14-95.13.1.ppc64le", "product_id": "gfs2-kmp-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-debug-4.12.14-95.13.1.ppc64le", "product_id": "kernel-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-95.13.1.ppc64le", "product_id": "kernel-debug-base-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-95.13.1.ppc64le", "product_id": "kernel-debug-devel-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-debug-extra-4.12.14-95.13.1.ppc64le", "product_id": "kernel-debug-extra-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-debug-kgraft-4.12.14-95.13.1.ppc64le", "product_id": "kernel-debug-kgraft-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-default-4.12.14-95.13.1.ppc64le", "product_id": "kernel-default-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-default-base-4.12.14-95.13.1.ppc64le", "product_id": "kernel-default-base-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-95.13.1.ppc64le", "product_id": "kernel-default-devel-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-95.13.1.ppc64le", "product_id": "kernel-default-extra-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-default-kgraft-4.12.14-95.13.1.ppc64le", "product_id": "kernel-default-kgraft-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-95.13.1.ppc64le", "product_id": "kernel-obs-build-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-95.13.1.ppc64le", "product_id": "kernel-obs-qa-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-95.13.1.ppc64le", "product_id": "kernel-syms-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-95.13.1.ppc64le", "product_id": "kernel-vanilla-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-95.13.1.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.13.1.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-95.13.1.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "product": { "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "product_id": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "kselftests-kmp-debug-4.12.14-95.13.1.ppc64le", "product_id": "kselftests-kmp-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.13.1.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-95.13.1.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.12.14-95.13.1.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.12.14-95.13.1.ppc64le", "product_id": "ocfs2-kmp-debug-4.12.14-95.13.1.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-95.13.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.13.1.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.s390x", "product_id": "cluster-md-kmp-default-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.13.1.s390x", "product": { "name": "dlm-kmp-default-4.12.14-95.13.1.s390x", "product_id": "dlm-kmp-default-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.13.1.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-95.13.1.s390x", "product_id": "gfs2-kmp-default-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-4.12.14-95.13.1.s390x", "product_id": "kernel-default-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-base-4.12.14-95.13.1.s390x", "product_id": "kernel-default-base-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-devel-4.12.14-95.13.1.s390x", "product_id": "kernel-default-devel-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-extra-4.12.14-95.13.1.s390x", "product_id": "kernel-default-extra-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-kgraft-4.12.14-95.13.1.s390x", "product_id": "kernel-default-kgraft-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-95.13.1.s390x", "product": { "name": "kernel-default-man-4.12.14-95.13.1.s390x", "product_id": "kernel-default-man-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.13.1.s390x", "product": { "name": "kernel-obs-build-4.12.14-95.13.1.s390x", "product_id": "kernel-obs-build-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.13.1.s390x", "product": { "name": "kernel-obs-qa-4.12.14-95.13.1.s390x", "product_id": "kernel-obs-qa-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.13.1.s390x", "product": { "name": "kernel-syms-4.12.14-95.13.1.s390x", "product_id": "kernel-syms-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.13.1.s390x", "product": { "name": "kernel-vanilla-4.12.14-95.13.1.s390x", "product_id": "kernel-vanilla-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.13.1.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-95.13.1.s390x", "product_id": "kernel-vanilla-base-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.13.1.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-95.13.1.s390x", "product_id": "kernel-vanilla-devel-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-95.13.1.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-95.13.1.s390x", "product_id": "kernel-zfcpdump-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-95.13.1.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-95.13.1.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.13.1.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-95.13.1.s390x", "product_id": "kselftests-kmp-default-4.12.14-95.13.1.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.13.1.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.s390x", "product_id": "ocfs2-kmp-default-4.12.14-95.13.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.12.14-95.13.1.x86_64", "product": { "name": "cluster-md-kmp-debug-4.12.14-95.13.1.x86_64", "product_id": "cluster-md-kmp-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.12.14-95.13.1.x86_64", "product": { "name": "dlm-kmp-debug-4.12.14-95.13.1.x86_64", "product_id": "dlm-kmp-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-95.13.1.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-95.13.1.x86_64", "product_id": "dlm-kmp-default-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.12.14-95.13.1.x86_64", "product": { "name": "gfs2-kmp-debug-4.12.14-95.13.1.x86_64", "product_id": "gfs2-kmp-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-95.13.1.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-95.13.1.x86_64", "product_id": "gfs2-kmp-default-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-debug-4.12.14-95.13.1.x86_64", "product_id": "kernel-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-95.13.1.x86_64", "product_id": "kernel-debug-base-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-95.13.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-debug-extra-4.12.14-95.13.1.x86_64", "product_id": "kernel-debug-extra-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-kgraft-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-debug-kgraft-4.12.14-95.13.1.x86_64", "product_id": "kernel-debug-kgraft-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-default-4.12.14-95.13.1.x86_64", "product_id": "kernel-default-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-95.13.1.x86_64", "product_id": "kernel-default-base-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-95.13.1.x86_64", "product_id": "kernel-default-devel-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-default-extra-4.12.14-95.13.1.x86_64", "product_id": "kernel-default-extra-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-kgraft-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-default-kgraft-4.12.14-95.13.1.x86_64", "product_id": "kernel-default-kgraft-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-95.13.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-95.13.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-95.13.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-95.13.1.x86_64", "product_id": "kernel-obs-build-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-95.13.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-syms-4.12.14-95.13.1.x86_64", "product_id": "kernel-syms-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-95.13.1.x86_64", "product_id": "kernel-vanilla-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-95.13.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-95.13.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-95.13.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "product": { "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "product_id": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.12.14-95.13.1.x86_64", "product": { "name": "kselftests-kmp-debug-4.12.14-95.13.1.x86_64", "product_id": "kselftests-kmp-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-95.13.1.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-95.13.1.x86_64", "product_id": "kselftests-kmp-default-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.12.14-95.13.1.x86_64", "product": { "name": "ocfs2-kmp-debug-4.12.14-95.13.1.x86_64", "product_id": "ocfs2-kmp-debug-4.12.14-95.13.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-95.13.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 12 SP4", "product": { "name": "SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sled:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product": { "name": "SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-live-patching:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product": { "name": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-sdk:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 12 SP4", "product": { "name": "SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:12:sp4" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product": { "name": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:12:sp4" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4", "product_id": "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4", "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le" }, "product_reference": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4", "product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64" }, "product_reference": "kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-docs-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-obs-build-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4", "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP4", "product_id": "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-default-man-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-devel-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-macros-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-95.13.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch" }, "product_reference": "kernel-source-4.12.14-95.13.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-95.13.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-95.13.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x" }, "product_reference": "kernel-syms-4.12.14-95.13.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4", "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-95.13.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP4", "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-95.13.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP4" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-5753", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2017-5753" } ], "notes": [ { "category": "general", "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2017-5753", "url": "https://www.suse.com/security/cve/CVE-2017-5753" }, { "category": "external", "summary": "SUSE Bug 1068032 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1068032" }, { "category": "external", "summary": "SUSE Bug 1074562 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074562" }, { "category": "external", "summary": "SUSE Bug 1074578 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074578" }, { "category": "external", "summary": "SUSE Bug 1074701 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1074701" }, { "category": "external", "summary": "SUSE Bug 1075006 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075006" }, { "category": "external", "summary": "SUSE Bug 1075419 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075419" }, { "category": "external", "summary": "SUSE Bug 1075748 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1075748" }, { "category": "external", "summary": "SUSE Bug 1080039 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1080039" }, { "category": "external", "summary": "SUSE Bug 1087084 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087084" }, { "category": "external", "summary": "SUSE Bug 1087939 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1087939" }, { "category": "external", "summary": "SUSE Bug 1089055 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1089055" }, { "category": "external", "summary": "SUSE Bug 1136865 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1136865" }, { "category": "external", "summary": "SUSE Bug 1178658 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1178658" }, { "category": "external", "summary": "SUSE Bug 1201877 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1201877" }, { "category": "external", "summary": "SUSE Bug 1209547 for CVE-2017-5753", "url": "https://bugzilla.suse.com/1209547" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "important" } ], "title": "CVE-2017-5753" }, { "cve": "CVE-2018-20669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20669" } ], "notes": [ { "category": "general", "text": "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20669", "url": "https://www.suse.com/security/cve/CVE-2018-20669" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2018-20669", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "important" } ], "title": "CVE-2018-20669" }, { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-3819" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "important" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "important" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7308" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7308", "url": "https://www.suse.com/security/cve/CVE-2019-7308" }, { "category": "external", "summary": "SUSE Bug 1124055 for CVE-2019-7308", "url": "https://bugzilla.suse.com/1124055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "important" } ], "title": "CVE-2019-7308" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "important" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-8980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8980" } ], "notes": [ { "category": "general", "text": "A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8980", "url": "https://www.suse.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "SUSE Bug 1126209 for CVE-2019-8980", "url": "https://bugzilla.suse.com/1126209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "low" } ], "title": "CVE-2019-8980" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Desktop 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Desktop 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.ppc64le", "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_13-default-1-6.7.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-man-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-docs-4.12.14-95.13.1.noarch", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.aarch64", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.ppc64le", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.s390x", "SUSE Linux Enterprise Software Development Kit 12 SP4:kernel-obs-build-4.12.14-95.13.1.x86_64", "SUSE Linux Enterprise Workstation Extension 12 SP4:kernel-default-extra-4.12.14-95.13.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-26T17:00:55Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
suse-su-2019:0784-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).\n- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable (bnc#1123161).\n- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).\n- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).\n- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n- CVE-2019-7221: Fixed a user-after-free vulnerability in the KVM hypervisor related to the emulation of a preemption timer, allowing an guest user/process to crash the host kernel. (bsc#1124732).\n- CVE-2019-7222: Fixed an information leakage in the KVM hypervisor related to handling page fault exceptions, which allowed a guest user/process to use this flaw to leak the host\u0027s stack memory contents to a guest (bsc#1124735).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).\n- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks. (bnc#1122971).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).\n- 9p: clear dangling pointers in p9stat_free (bsc#1051510).\n- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).\n- 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n- 9p/net: put a lower bound on msize (bsc#1051510).\n- 9p: use inode-\u003ei_lock to protect i_size_write() under 32-bit (bsc#1051510).\n- ACPI/APEI: Clear GHES block_status before panic() (bsc#1051510).\n- acpi / device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).\n- acpi/nfit: Block function zero DSMs (bsc#1051510).\n- acpi, nfit: Fix Address Range Scrub completion tracking (bsc#1124969).\n- acpi/nfit: Fix bus command validation (bsc#1051510).\n- acpi/nfit: Fix command-supported detection (bsc#1051510).\n- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).\n- acpi/nfit: Fix user-initiated ARS to be \u0027ARS-long\u0027 rather than \u0027ARS-short\u0027 (bsc#1124969).\n- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).\n- acpi: power: Skip duplicate power resource references in _PRx (bsc#1051510).\n- acpi / video: Extend chassis-type detection with a \u0027Lunch Box\u0027 check (bsc#1051510).\n- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705\n- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).\n- add mainline tags for two hyperv iommu patches\n- Adjust a commit id in a nvme patch to make our scripts happy\n- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).\n- ALSA: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).\n- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n- ALSA: compress: Fix stop handling on compressed capture streams (bsc#1051510).\n- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).\n- ALSA: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).\n- ALSA: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).\n- ALSA: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).\n- ALSA: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).\n- ALSA: hda/realtek - Fixed hp_pin no value (bsc#1051510).\n- ALSA: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).\n- ALSA: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).\n- ALSA: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).\n- ALSA: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).\n- ALSA: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).\n- ALSA: hda - Serialize codec registrations (bsc#1122944).\n- ALSA: hda - Use standard device registration for beep (bsc#1122944).\n- ALSA: oxfw: add support for APOGEE duet FireWire (bsc#1051510).\n- ALSA: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).\n- ALSA: usb-audio: Add support for new T+A USB DAC (bsc#1051510).\n- ALSA: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).\n- altera-stapl: check for a null key before strcasecmp\u0027ing it (bsc#1051510).\n- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).\n- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).\n- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).\n- arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).\n- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).\n- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).\n- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).\n- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n- arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).\n- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).\n- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).\n- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).\n- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).\n- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).\n- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).\n- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).\n- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).\n- arm: pxa: avoid section mismatch warning (bsc#1051510).\n- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).\n- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).\n- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).\n- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).\n- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).\n- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).\n- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).\n- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).\n- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).\n- assoc_array: Fix shortcut creation (bsc#1051510).\n- ata: ahci: mvebu: remove stale comment (bsc#1051510).\n- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).\n- ath9k: dynack: check da-\u003eenabled first in sampling routines (bsc#1051510).\n- ath9k: dynack: make ewma estimation faster (bsc#1051510).\n- ath9k: dynack: use authentication messages for \u0027late\u0027 ack (bsc#1051510).\n- atm: he: fix sign-extension overflow on large shift (bsc#1051510).\n- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).\n- ax25: fix possible use-after-free (bsc#1051510).\n- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)\n- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).\n- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).\n- batman-adv: Force mac header to start of data on xmit (bsc#1051510).\n- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).\n- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).\n- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).\n- blk-mq: fix a hung issue when fsync (bsc#1125252).\n- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).\n- block: break discard submissions into the user defined size (git-fixes).\n- block: cleanup __blkdev_issue_discard() (git-fixes).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- blockdev: Fix livelocks on loop device (bsc#1124984).\n- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128895).\n- block: do not warn when doing fsync on read-only devices (bsc#1125252).\n- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).\n- block: fix infinite loop if the device loses discard capability (git-fixes).\n- block/loop: Use global lock for ioctl() operation (bsc#1124974).\n- block: make sure discard bio is aligned with logical block size (git-fixes).\n- block: make sure writesame bio is aligned with logical block size (git-fixes).\n- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).\n- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).\n- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).\n- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).\n- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).\n- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).\n- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).\n- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).\n- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282).\n- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).\n- bonding: update nest level on unlink (git-fixes).\n- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).\n- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).\n- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1083647).\n- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).\n- bpf: Fix syscall\u0027s stackmap lookup potential deadlock (bsc#1083647).\n- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).\n- bpf/verifier: fix verifier instability (bsc#1056787).\n- bsg: allocate sense buffer if requested (bsc#1106811).\n- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).\n- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).\n- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).\n- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).\n- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).\n- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).\n- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).\n- btrfs: fix fsync after succession of renames of different files (bsc#1126481).\n- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).\n- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).\n- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).\n- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).\n- btrfs: Improve btrfs_search_slot description (bsc#1126802).\n- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1063638).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).\n- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).\n- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).\n- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1063638).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).\n- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).\n- btrfs: remove always true check in unlock_up (bsc#1126802).\n- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).\n- btrfs: remove unnecessary level check in balance_level (bsc#1126802).\n- btrfs: remove unused check of skip_locking (bsc#1126802).\n- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).\n- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).\n- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n- btrfs: split btrfs_extent_same (bsc#1127493).\n- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).\n- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).\n- can: bcm: check timer values before ktime conversion (bsc#1051510).\n- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).\n- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).\n- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).\n- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126790).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).\n- cfg80211: extend range deviation for DMG (bsc#1051510).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).\n- checkstack.pl: fix for aarch64 (bsc#1051510).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: add missing debug entries for kconfig options (bsc#1051510).\n- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510).\n- cifs: add sha512 secmech (bsc#1051510).\n- cifs: Add support for reading attributes on SMB2+ (bsc#1051510).\n- cifs: Add support for writing attributes on SMB2+ (bsc#1051510).\n- cifs: Always resolve hostname before reconnecting (bsc#1051510).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).\n- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).\n- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).\n- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510).\n- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).\n- cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n- cifs: fix return value for cifs_listxattr (bsc#1051510).\n- cifs: Fix separator when building path from dentry (bsc#1051510).\n- cifs: fix set info (bsc#1051510).\n- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).\n- cifs: fix wrapping bugs in num_entries() (bsc#1051510).\n- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: implement v3.11 preauth integrity (bsc#1051510).\n- cifs: invalidate cache when we truncate a file (bsc#1051510).\n- cifs: make \u0027nodfs\u0027 mount opt a superblock flag (bsc#1051510).\n- cifs: OFD locks do not conflict with eachothers (bsc#1051510).\n- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).\n- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: refactor crypto shash/sdesc allocation\u0026free (bsc#1051510).\n- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).\n- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).\n- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).\n- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).\n- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).\n- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).\n- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).\n- clk: imx6q: reset exclusive gates on init (bsc#1051510).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).\n- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).\n- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).\n- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).\n- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).\n- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).\n- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).\n- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).\n- clk: socfpga: fix refcount leak (bsc#1051510).\n- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).\n- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).\n- clk: sunxi-ng: enable so-said LDOs for A64 SoC\u0027s pll-mipi clock (bsc#1051510).\n- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).\n- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).\n- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).\n- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).\n- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).\n- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).\n- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).\n- configfs: fix registered group removal (bsc#1051510).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).\n- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).\n- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).\n- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).\n- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).\n- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).\n- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n- Cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).\n- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).\n- crypto: ahash - fix another early termination in hash walk (bsc#1051510).\n- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).\n- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).\n- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).\n- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).\n- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).\n- crypto: caam - fixed handling of sg list (bsc#1051510).\n- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).\n- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).\n- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).\n- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).\n- crypto: hash - set CRYPTO_TFM_NEED_KEY if -\u003esetkey() fails (bsc#1051510).\n- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).\n- crypto: tgr192 - fix unaligned memory access (bsc#1051510).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).\n- cw1200: drop useless LIST_HEAD (bsc#1051510).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).\n- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).\n- debugfs: fix debugfs_rename parameter checking (bsc#1051510).\n- Delete patches.fixes/block-loop-Use-global-lock-for-ioctl-operation.patch: It makes existing deadlocks much more probable (bsc#1129739).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).\n- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).\n- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).\n- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).\n- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).\n- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).\n- dmaengine: at_hdmac: fix module unloading (bsc#1051510).\n- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).\n- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).\n- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).\n- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).\n- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).\n- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).\n- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).\n- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).\n- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).\n- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).\n- dma: Introduce dma_max_mapping_size() (bsc#1120008).\n- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).\n- dm: call blk_queue_split() to impose device limits on bios (git-fixes).\n- dm: do not allow readahead to limit IO size (git-fixes).\n- dm thin: send event about thin-pool state change _after_ making it (git-fixes).\n- dm zoned: Fix target BIO completion handling (git-fixes).\n- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).\n- Do not log confusing message on reconnect by default (bsc#1129664).\n- Do not log expected error on DFS referral request (bsc#1051510).\n- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).\n- driver core: Move async_synchronize_full call (bsc#1051510).\n- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).\n- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).\n- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).\n- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- drivers/sbus/char: add of_node_put() (bsc#1051510).\n- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).\n- drm/ast: Fix connector leak during driver unload (bsc#1051510).\n- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).\n- drm/atomic-helper: Complete fake_commit-\u003eflip_done potentially earlier (bsc#1051510).\n- drm: Block fb changes for async plane updates (bsc#1051510).\n- drm/bridge: tc358767: add defines for DP1_SRCCTRL \u0026 PHY_2LANE (bsc#1051510).\n- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).\n- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).\n- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).\n- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).\n- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n- drm: Clear state-\u003eacquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).\n- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).\n- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)\n- drm/etnaviv: potential NULL dereference (bsc#1113722)\n- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)\n- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)\n- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)\n- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n- drm/i915/gvt: Fix mmap range check (bsc#1120902)\n- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)\n- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).\n- drm/i915/opregion: fix version check (bsc#1113722)\n- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)\n- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)\n- drm/meson: add missing of_node_put (bsc#1051510).\n- drm/modes: Prevent division by zero htotal (bsc#1051510).\n- drm/msm: Fix error return checking (bsc#1051510).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).\n- drm/msm: Unblock writer if reader closes file (bsc#1051510).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)\n- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).\n- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)\n- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)\n- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).\n- drm/rockchip: fix for mailbox read size (bsc#1051510).\n- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)\n- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)\n- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)\n- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).\n- earlycon: Initialize port-\u003euartclk based on clock-frequency property (bsc#1051510).\n- earlycon: Remove hardcoded port-\u003euartclk initialization in of_setup_earlycon (bsc#1051510).\n- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).\n- enic: fix checksum validation for IPv6 (bsc#1051510).\n- esp6: fix memleak on error path in esp6_input (bsc#1051510).\n- esp: Fix locking on page fragment allocation (bsc#1051510).\n- esp: Fix memleaks on error paths (bsc#1051510).\n- esp: Fix skb tailroom calculation (bsc#1051510).\n- exportfs: do not read dentry after free (bsc#1051510).\n- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).\n- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).\n- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).\n- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).\n- fanotify: fix handling of events on child sub-directory (bsc#1122019).\n- fat: validate -\u003ei_start before using (bsc#1051510).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1113722)\n- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).\n- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).\n- floppy: check_events callback should not return a negative number (bsc#1051510).\n- fork: do not copy inconsistent signal handler state to child (bsc#1051510).\n- fork: record start_time late (git-fixes).\n- fork: unconditionally clear stack on fork (git-fixes).\n- fs/cifs: require sha512 (bsc#1051510).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).\n- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).\n- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).\n- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).\n- fuse: handle zero sized retrieve correctly (bsc#1051510).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bsc#1051510).\n- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).\n- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).\n- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).\n- geneve, vxlan: Do not set exceptions if skb-\u003elen \u0026lt; mtu (bsc#1123456).\n- genwqe: Fix size check (bsc#1051510).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bsc#1120601).\n- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).\n- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).\n- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).\n- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).\n- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).\n- gpio: pl061: handle failed allocations (bsc#1051510).\n- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).\n- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)\n- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).\n- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).\n- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).\n- hfs: do not free node before using (bsc#1051510).\n- hfsplus: do not free node before using (bsc#1051510).\n- hfsplus: prevent btree data loss on root split (bsc#1051510).\n- hfs: prevent btree data loss on root split (bsc#1051510).\n- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).\n- hpet: Fix missing \u0027=\u0027 character in the __setup() code of hpet_mmap_enable (git-fixes).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).\n- hv: v4.12 API for hyperv-iommu (bsc#1122822).\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).\n- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).\n- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).\n- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).\n- i2c-axxia: check for error conditions first (bsc#1051510).\n- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).\n- i2c: cadence: Fix the hold bit setting (bsc#1051510).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).\n- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).\n- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).\n- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).\n- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).\n- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).\n- IB/core: Destroy QP if XRC QP fails (bsc#1046306).\n- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).\n- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).\n- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).\n- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- ide: pmac: add of_node_put() (bsc#1051510).\n- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).\n- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).\n- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).\n- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).\n- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).\n- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).\n- input: bma150 - register input device after setting private data (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).\n- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).\n- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).\n- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).\n- input: raspberrypi-ts - fix link error (git-fixes).\n- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).\n- input: restore EV_ABS ABS_RESERVED (bsc#1051510).\n- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).\n- input: synaptics - enable SMBus for HP EliteBook 840 G4 (bsc#1051510).\n- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).\n- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).\n- intel_th: Do not reference unassigned outputs (bsc#1051510).\n- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).\n- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).\n- iomap: warn on zero-length mappings (bsc#1127062).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).\n- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).\n- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).\n- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).\n- ipmi:pci: Blacklist a Realtek \u0027IPMI\u0027 device (git-fixes).\n- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).\n- ipsec: check return value of skb_to_sgvec always (bsc#1051510).\n- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).\n- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: addrlabel: per netns list (bsc#1122982).\n- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).\n- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).\n- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).\n- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).\n- ip: validate header length on virtual device xmit (networking-stable-19_01_04).\n- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).\n- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).\n- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).\n- iscsi target: fix session creation failure handling (bsc#1051510).\n- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).\n- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).\n- iser: set sector for ambiguous mr status errors (bsc#1051510).\n- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).\n- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).\n- iwlwifi: mvm: fix RSS config command (bsc#1051510).\n- iwlwifi: pcie: fix emergency path (bsc#1051510).\n- iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).\n- ixgbe: check return value of napi_complete_done() (bsc#1051510).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).\n- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).\n- kabi: fix xhci kABI stability (bsc#1119086).\n- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).\n- kabi: handle addition of uevent_sock into struct net (bsc#1122982).\n- kabi: Preserve kABI for dma_max_mapping_size() (bsc#1120008).\n- kabi: protect struct sctp_association (kabi).\n- kabi: protect vhost_log_write (kabi).\n- kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n- kabi workaroudn for ath9k ath_node.ackto type change (bsc#1051510).\n- kABI workaround for bt_accept_enqueue() change (bsc#1051510).\n- kabi workaround for deleted snd_hda_register_beep_device() (bsc#1122944).\n- kabi workaround for snd_hda_bus.bus_probing addition (bsc#1122944).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).\n- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).\n- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).\n- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).\n- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).\n- KEYS: allow reaching the keys quotas exactly (bsc#1051510).\n- keys: Timestamp new keys (bsc#1051510).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).\n- kgdboc: Fix restrict error (bsc#1051510).\n- kgdboc: Fix warning with module build (bsc#1051510).\n- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).\n- kobject: copy env blob in one go (bsc#1122982).\n- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).\n- kvm: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).\n- kvm: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).\n- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).\n- kvm: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).\n- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: fix L1TF\u0027s MMIO GFN calculation (bsc#1124204).\n- kvm: x86: Fix single-step debugging (bsc#1129295).\n- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).\n- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).\n- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).\n- lan78xx: Resolve issue with changing MAC address (bsc#1051510).\n- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).\n- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).\n- libceph: handle an empty authorize reply (bsc#1126789).\n- lib/div64.c: off by one in shift (bsc#1051510).\n- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).\n- libnvdimm/label: Clear \u0027updating\u0027 flag after label-set update (bsc#1129543).\n- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).\n- lib/rbtree-test: lower default params (git-fixes).\n- lightnvm: fail fast on passthrough commands (bsc#1125780).\n- livepatch: Change unsigned long old_addr -\u003e void *old_func in struct klp_func (bsc#1071995).\n- livepatch: Consolidate klp_free functions (bsc#1071995 ).\n- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).\n- livepatch: Define a macro for new API identification (bsc#1071995).\n- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).\n- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).\n- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).\n- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).\n- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).\n- livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).\n- livepatch: Send a fake signal periodically (bsc#1071995 ).\n- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).\n- livepatch: Simplify API by removing registration step (bsc#1071995).\n- llc: do not use sk_eat_skb() (bsc#1051510).\n- lockd: fix access beyond unterminated strings in prints (git-fixes).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: drop caches if offset or block_size are changed (bsc#1124975).\n- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).\n- LSM: Check for NULL cred-security on free (bsc#1051510).\n- mac80211: Add attribute aligned(2) to struct \u0027action\u0027 (bsc#1051510).\n- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).\n- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).\n- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).\n- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).\n- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).\n- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).\n- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).\n- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).\n- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).\n- media: s5k4ecgx: delete a bogus error message (bsc#1051510).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).\n- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).\n- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).\n- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).\n- media: uvcvideo: Fix \u0027type\u0027 check leading to overflow (bsc#1051510).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).\n- media: v4l2-tpg: array index could become negative (bsc#1051510).\n- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).\n- media: vb2: be sure to unlock mutex on errors (bsc#1051510).\n- media: vb2: vb2_mmap: move lock up (bsc#1051510).\n- media: vivid: fix error handling of kthread_run (bsc#1051510).\n- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).\n- media: vivid: set min width/height to a value \u003e 0 (bsc#1051510).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).\n- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).\n- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).\n- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).\n- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).\n- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).\n- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).\n- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).\n- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).\n- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).\n- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).\n- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).\n- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).\n- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).\n- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).\n- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).\n- misc: sram: enable clock before registering regions (bsc#1051510).\n- misc: sram: fix resource leaks in probe error path (bsc#1051510).\n- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).\n- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).\n- mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).\n- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).\n- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).\n- mmap: relax file size limit for regular files (git fixes (mm/mmap)).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).\n- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).\n- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).\n- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).\n- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).\n- mmc: omap: fix the maximum timeout setting (bsc#1051510).\n- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).\n- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n- mmc: spi: Fix card detection during probe (bsc#1051510).\n- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).\n- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).\n- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).\n- mm/ksm.c: ignore STABLE_FLAG of rmap_item-\u003eaddress in rmap_walk_ksm() (git fixes (mm/ksm)).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).\n- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).\n- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)\n- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).\n- mm: migration: factor out code to compute expected number of page references (bsc#1084216).\n- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).\n- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).\n- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).\n- Move the upstreamed HD-audio fix into sorted section\n- mpt3sas: check sense buffer before copying sense data (bsc#1106811).\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).\n- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).\n- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).\n- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).\n- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).\n- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).\n- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).\n- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).\n- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).\n- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).\n- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).\n- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).\n- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).\n- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).\n- mtd: nand: ifc: update bufnum mask for ver \u003e= 2.0.0 (bsc#1051510).\n- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).\n- mtd: nand: omap2: Fix subpage write (bsc#1051510).\n- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).\n- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).\n- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).\n- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).\n- mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).\n- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).\n- mv88e6060: disable hardware level MAC learning (bsc#1051510).\n- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).\n- neighbour: Avoid writing before skb-\u003ehead in neigh_hh_output() (networking-stable-18_12_12).\n- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).\n- net: add uevent socket member (bsc#1122982).\n- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).\n- net: aquantia: fixed instack structure overflow (git-fixes).\n- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).\n- net: bcmgenet: abort suspend on error (bsc#1051510).\n- net: bcmgenet: code movement (bsc#1051510).\n- net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n- net: bcmgenet: return correct value \u0027ret\u0027 from bcmgenet_power_down (bsc#1051510).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).\n- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- net: do not call update_pmtu unconditionally (bsc#1123456).\n- net: Do not default Cavium PTP driver to \u0027y\u0027 (bsc#1110096).\n- net: dp83640: expire old TX-skb (networking-stable-19_02_10).\n- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).\n- net: ena: fix race between link up and device initalization (bsc#1083548).\n- netfilter: nf_tables: check the result of dereferencing base_chain-\u003estats (git-fixes).\n- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).\n- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).\n- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).\n- net: hns3: add handling for big TX fragment (bsc#1104353 ).\n- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).\n- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).\n- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).\n- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).\n- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).\n- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).\n- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).\n- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).\n- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).\n- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).\n- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).\n- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).\n- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).\n- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).\n- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).\n- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).\n- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Release resource on error flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).\n- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).\n- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).\n- netns: restrict uevents (bsc#1122982).\n- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).\n- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).\n- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).\n- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).\n- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).\n- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).\n- netrom: switch to sock timer API (bsc#1051510).\n- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).\n- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).\n- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).\n- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).\n- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).\n- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).\n- net: stmmac: Fix PCI module removal leak (git-fixes).\n- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).\n- net: stmmac: Use mutex instead of spinlock (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).\n- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).\n- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).\n- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).\n- nfit: acpi_nfit_ctl(): Check out_obj-\u003etype in the right place (bsc#1129547).\n- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).\n- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).\n- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).\n- nfsd: Fix an Oops in free_session() (git-fixes).\n- nfs: Fix a missed page unlock after pg_doio() (git-fixes).\n- nfs: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).\n- nfsv4.1: Fix the r/wsize checking (git-fixes).\n- nfsv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).\n- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).\n- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).\n- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).\n- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).\n- nvme: kABI fix for scan_lock (bsc#1123882).\n- nvme: lock NS list changes while handling command effects (bsc#1123882).\n- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).\n- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).\n- nvme-multipath: round-robin I/O policy (bsc#1110705).\n- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).\n- of, numa: Validate some distance map rules (bsc#1051510).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).\n- omap2fb: Fix stack memory disclosure (bsc#1120902)\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).\n- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).\n- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).\n- packet: Do not leak dev refcounts on error exit (git-fixes).\n- packet: validate address length if non-zero (networking-stable-19_01_04).\n- packet: validate address length (networking-stable-19_01_04).\n- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).\n- Partially revert \u0027block: fail op_is_write() requests to (bsc#1125252).\n- pci: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).\n- pci: Disable broken RTIT_BAR of Intel TH (bsc#1120318).\n- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).\n- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).\n- pci/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).\n- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).\n- pcrypt: use format specifier in kobject_add (bsc#1051510).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).\n- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).\n- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).\n- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).\n- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).\n- phy: tegra: remove redundant self assignment of \u0027map\u0027 (bsc#1051510).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bsc#1051510).\n- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).\n- pinctrl: meson: fix pull enable register calculation (bsc#1051510).\n- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).\n- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).\n- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).\n- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).\n- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).\n- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).\n- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).\n- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).\n- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).\n- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).\n- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).\n- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).\n- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).\n- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).\n- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).\n- powerpc/tm: Fix comment (bsc#1118338).\n- powerpc/tm: Fix endianness flip on trap (bsc#1118338).\n- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).\n- powerpc/tm: Fix HTM documentation (bsc#1118338).\n- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).\n- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).\n- powerpc/tm: Print 64-bits MSR (bsc#1118338).\n- powerpc/tm: Print scratch value (bsc#1118338).\n- powerpc/tm: Reformat comments (bsc#1118338).\n- powerpc/tm: Remove msr_tm_active() (bsc#1118338).\n- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).\n- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).\n- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).\n- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).\n- powerpc/tm: Update function prototype comment (bsc#1118338).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).\n- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).\n- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).\n- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).\n- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).\n- ptp_kvm: probe for kvm guest availability (bsc#1098382).\n- ptr_ring: wrap back -\u003eproducer in __ptr_ring_swap_queue() (networking-stable-19_01_04).\n- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).\n- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).\n- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).\n- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).\n- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).\n- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).\n- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).\n- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).\n- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).\n- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).\n- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).\n- RDMA/core: Fix unwinding flow in case of error to register device (bsc#1046306).\n- RDMA/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).\n- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).\n- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).\n- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).\n- Remove blacklist of virtio patch so we can install it (bsc#1114585)\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1051510).\n- Revert \u0027Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G\u0027 (bsc#1051510).\n- Revert \u0027openvswitch: Fix template leak in error cases.\u0027 (bsc#1051510).\n- Revert \u0027scsi: qla2xxx: Fix NVMe Target discovery\u0027 (bsc#1125252).\n- Revert \u0027sd: disable logical block provisioning if \u0027lbpme\u0027 is not set\u0027 This reverts commit e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not accepted upstream.\n- Revert \u0027serial: 8250: Fix clearing FIFOs in RS485 mode again\u0027 (bsc#1051510).\n- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.\n- Revert \u0027xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue\u0027 (bsc#1120854).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).\n- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697) dracut has been using permissions 0600 for the initrd for a long time.\n- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)\n- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).\n- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).\n- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).\n- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).\n- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).\n- s390/early: improve machine detection (git-fixes).\n- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).\n- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).\n- s390/qeth: fix use-after-free in error path (bsc#1127534).\n- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).\n- s390/sthyi: Fix machine name validity indication (git-fixes).\n- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).\n- sata_rcar: fix deferred probing (bsc#1051510).\n- sbus: char: add of_node_put() (bsc#1051510).\n- sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).\n- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- sch_multiq: fix double free on init failure (bsc#1051510).\n- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes\n- scripts/git_sort/git_sort.py: Add s390/linux.git fixes.\n- scripts/git_sort/git_sort.py: add vfs \u0027fixes\u0027 branch\n- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).\n- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).\n- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).\n- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).\n- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).\n- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).\n- scsi: lpfc: fix remoteport access (bsc#1125252).\n- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).\n- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).\n- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).\n- scsi: mpt3sas: Add ioc_\u003clevel\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u003clevel\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u003clevel\u003e with MPT3SAS_FMT to ioc_\u003clevel\u003e (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).\n- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).\n- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).\n- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).\n- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).\n- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).\n- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).\n- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).\n- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).\n- scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).\n- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).\n- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).\n- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).\n- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).\n- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).\n- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).\n- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).\n- sctp: kfree_rcu asoc (networking-stable-18_12_12).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).\n- selftests/livepatch: introduce tests (bsc#1071995).\n- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).\n- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).\n- selinux: always allow mounting submounts (bsc#1051510).\n- selinux: fix GPF on invalid policy (bsc#1051510).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).\n- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).\n- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).\n- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).\n- serial: imx: fix error handling in console_setup (bsc#1051510).\n- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).\n- serial/sunsu: fix refcount leak (bsc#1051510).\n- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).\n- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).\n- signal: Always deliver the kernel\u0027s SIGKILL and SIGSTOP to a pid namespace init (git-fixes).\n- skge: potential memory corruption in skge_get_regs() (bsc#1051510).\n- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).\n- sky2: Increase D3 delay again (bsc#1051510).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).\n- smb3.1.1 dialect is no longer experimental (bsc#1051510).\n- smb311: Fix reconnect (bsc#1051510).\n- smb311: Improve checking of negotiate security contexts (bsc#1051510).\n- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).\n- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).\n- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).\n- smb3: check for and properly advertise directory lease support (bsc#1051510).\n- smb3: directory sync should not return an error (bsc#1051510).\n- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).\n- smb3: do not request leases in symlink creation and query (bsc#1051510).\n- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510).\n- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).\n- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).\n- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).\n- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).\n- smb3: fix various xid leaks (bsc#1051510).\n- smb3: Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510).\n- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).\n- smb3: Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510).\n- smb3: remove noisy warning message on mount (bsc#1129664).\n- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).\n- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).\n- soc/tegra: Do not leak device tree node reference (bsc#1051510).\n- splice: do not merge into linked buffers (git-fixes).\n- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).\n- staging: iio: ad7780: update voltage on read (bsc#1051510).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).\n- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).\n- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).\n- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).\n- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).\n- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).\n- staging: speakup: Replace strncpy with memcpy (bsc#1051510).\n- staging: wilc1000: fix to set correct value for \u0027vif_num\u0027 (bsc#1051510).\n- sunrpc: correct the computation for page_ptr when truncating (git-fixes).\n- sunrpc: Fix a potential race in xprt_connect() (git-fixes).\n- sunrpc: Fix leak of krb5p encode pages (git-fixes).\n- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).\n- sunrpc: safely reallow resvport min/max inversion (git-fixes).\n- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).\n- swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).\n- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).\n- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).\n- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).\n- tcp: batch tcp_net_metrics_exit (bsc#1122982).\n- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).\n- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).\n- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).\n- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).\n- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).\n- tcp: lack of available data can also cause TSO defer (git-fixes).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).\n- team: Free BPF filter when unregistering netdev (bsc#1051510).\n- thermal: do not clear passive state during system sleep (bsc#1051510).\n- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).\n- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).\n- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).\n- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).\n- thermal: mediatek: fix register index error (bsc#1051510).\n- timekeeping: Use proper seqcount initializer (bsc#1051510).\n- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).\n- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).\n- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).\n- tipc: fix a double kfree_skb() (networking-stable-19_01_04).\n- tipc: fix a race condition of releasing subscriber object (bsc#1051510).\n- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).\n- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).\n- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).\n- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).\n- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).\n- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).\n- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).\n- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).\n- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).\n- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).\n- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).\n- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).\n- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).\n- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).\n- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).\n- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).\n- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).\n- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).\n- uevent: add alloc_uevent_skb() helper (bsc#1122982).\n- Update config files. Remove conditional support for SMB2 and SMB3:\n- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).\n- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).\n- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.\n- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).\n- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).\n- usb: Add new USB LPM helpers (bsc#1120902).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).\n- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).\n- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).\n- usb: dwc3: gadget: Clear req-\u003eneeds_extra_trb flag on cleanup (bsc#1120902).\n- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).\n- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).\n- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).\n- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).\n- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).\n- usb: musb: dsps: fix otg state machine (bsc#1051510).\n- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).\n- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).\n- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n- usb: phy: am335x: fix race condition in _probe (bsc#1051510).\n- usb: serial: option: add Fibocom NL678 series (bsc#1120902).\n- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).\n- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).\n- usb: storage: add quirk for SMI SM3350 (bsc#1120902).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).\n- usb: xhci: fix \u0027broken_suspend\u0027 placement in struct xchi_hcd (bsc#1119086).\n- veth: set peer GSO values (bsc#1051510).\n- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n- vfio: ccw: process ssch with interrupts disabled (git-fixes).\n- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).\n- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).\n- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).\n- vhost: log dirty page correctly (networking-stable-19_01_26).\n- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).\n- vhost/vsock: fix uninitialized vhost_vsock-\u003eguest_cid (bsc#1051510).\n- video: clps711x-fb: release disp device node in probe() (bsc#1051510).\n- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).\n- virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).\n- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).\n- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).\n- virtio/s390: avoid race on vcdev-\u003econfig (git-fixes).\n- virtio/s390: fix race in ccw_io_helper() (git-fixes).\n- vmci: Support upto 64-bit PPNs (bsc#1127286).\n- vscok: Send reset control packet when socket is partially bound (networking-stable-19_01_04).\n- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).\n- vt: invoke notifier on screen size change (bsc#1051510).\n- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).\n- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling gro_cells_receive() (git-fixes).\n- vxlan: update skb dst pmtu on tx path (bsc#1123456).\n- w90p910_ether: remove incorrect __init annotation (bsc#1051510).\n- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).\n- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/a.out: Clear the dump structure initially (bsc#1114279).\n- x86/apic: Provide apic_ack_irq() (bsc#1122822).\n- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).\n- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).\n- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).\n- x86/bugs: Add AMD\u0027s variant of SSB_NO (bsc#1114279).\n- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).\n- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).\n- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).\n- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).\n- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).\n- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).\n- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).\n- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).\n- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).\n- x86/vdso: Remove obsolete \u0027fake section table\u0027 reservation (bsc#1114279).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).\n- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).\n- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: fix dom0 boot on huge systems (bsc#1127836).\n- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).\n- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).\n- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).\n- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).\n- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).\n- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).\n- yama: Check for pid death before checking ancestry (bsc#1051510).\n- yama: fix a missing-check bug (bsc#1051510).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).\n- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-784,SUSE-SLE-Module-Basesystem-15-2019-784,SUSE-SLE-Module-Development-Tools-15-2019-784,SUSE-SLE-Module-Development-Tools-OBS-15-2019-784,SUSE-SLE-Module-Legacy-15-2019-784,SUSE-SLE-Module-Live-Patching-15-2019-784,SUSE-SLE-Product-HA-15-2019-784,SUSE-SLE-Product-WE-15-2019-784", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0784-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0784-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0784-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190784-1.html" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050252", "url": "https://bugzilla.suse.com/1050252" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1054610", "url": "https://bugzilla.suse.com/1054610" }, { "category": "self", "summary": "SUSE Bug 1055121", "url": "https://bugzilla.suse.com/1055121" }, { "category": "self", "summary": "SUSE Bug 1056658", "url": "https://bugzilla.suse.com/1056658" }, { "category": "self", "summary": "SUSE Bug 1056662", "url": "https://bugzilla.suse.com/1056662" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1063638", "url": "https://bugzilla.suse.com/1063638" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1070995", "url": "https://bugzilla.suse.com/1070995" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1084216", "url": "https://bugzilla.suse.com/1084216" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1088133", "url": "https://bugzilla.suse.com/1088133" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098382", "url": "https://bugzilla.suse.com/1098382" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106434", "url": "https://bugzilla.suse.com/1106434" }, { "category": "self", "summary": "SUSE Bug 1106811", "url": "https://bugzilla.suse.com/1106811" }, { "category": "self", "summary": "SUSE Bug 1107078", "url": "https://bugzilla.suse.com/1107078" }, { "category": "self", "summary": "SUSE Bug 1107665", "url": "https://bugzilla.suse.com/1107665" }, { "category": "self", "summary": "SUSE Bug 1108101", "url": "https://bugzilla.suse.com/1108101" }, { "category": "self", "summary": "SUSE Bug 1108870", "url": "https://bugzilla.suse.com/1108870" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1110096", "url": "https://bugzilla.suse.com/1110096" }, { "category": "self", "summary": "SUSE Bug 1110705", "url": "https://bugzilla.suse.com/1110705" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1113042", "url": "https://bugzilla.suse.com/1113042" }, { "category": "self", "summary": "SUSE Bug 1113712", "url": "https://bugzilla.suse.com/1113712" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113939", "url": "https://bugzilla.suse.com/1113939" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114585", "url": "https://bugzilla.suse.com/1114585" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117155", "url": "https://bugzilla.suse.com/1117155" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1118338", "url": "https://bugzilla.suse.com/1118338" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119086", "url": "https://bugzilla.suse.com/1119086" }, { "category": "self", "summary": "SUSE Bug 1119766", "url": "https://bugzilla.suse.com/1119766" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120008", "url": "https://bugzilla.suse.com/1120008" }, { "category": "self", "summary": "SUSE Bug 1120318", "url": "https://bugzilla.suse.com/1120318" }, { "category": "self", "summary": "SUSE Bug 1120601", "url": "https://bugzilla.suse.com/1120601" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120854", "url": "https://bugzilla.suse.com/1120854" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1120909", "url": "https://bugzilla.suse.com/1120909" }, { "category": "self", "summary": "SUSE Bug 1120955", "url": "https://bugzilla.suse.com/1120955" }, { "category": "self", "summary": "SUSE Bug 1121317", "url": "https://bugzilla.suse.com/1121317" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1121789", "url": "https://bugzilla.suse.com/1121789" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122019", "url": "https://bugzilla.suse.com/1122019" }, { "category": "self", "summary": "SUSE Bug 1122192", "url": "https://bugzilla.suse.com/1122192" }, { "category": "self", "summary": "SUSE Bug 1122324", "url": "https://bugzilla.suse.com/1122324" }, { "category": "self", "summary": "SUSE Bug 1122554", "url": "https://bugzilla.suse.com/1122554" }, { "category": "self", "summary": "SUSE Bug 1122662", "url": "https://bugzilla.suse.com/1122662" }, { "category": "self", "summary": "SUSE Bug 1122764", "url": "https://bugzilla.suse.com/1122764" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122822", "url": "https://bugzilla.suse.com/1122822" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1122927", "url": "https://bugzilla.suse.com/1122927" }, { "category": "self", "summary": "SUSE Bug 1122944", "url": "https://bugzilla.suse.com/1122944" }, { "category": "self", "summary": "SUSE Bug 1122971", "url": "https://bugzilla.suse.com/1122971" }, { "category": "self", "summary": "SUSE Bug 1122982", "url": "https://bugzilla.suse.com/1122982" }, { "category": "self", "summary": "SUSE Bug 1123060", "url": "https://bugzilla.suse.com/1123060" }, { "category": "self", "summary": "SUSE Bug 1123061", "url": "https://bugzilla.suse.com/1123061" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1123317", "url": "https://bugzilla.suse.com/1123317" }, { "category": "self", "summary": "SUSE Bug 1123348", "url": "https://bugzilla.suse.com/1123348" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE Bug 1123456", "url": "https://bugzilla.suse.com/1123456" }, { "category": "self", "summary": "SUSE Bug 1123538", "url": "https://bugzilla.suse.com/1123538" }, { "category": "self", "summary": "SUSE Bug 1123697", "url": "https://bugzilla.suse.com/1123697" }, { "category": "self", "summary": "SUSE Bug 1123882", "url": "https://bugzilla.suse.com/1123882" }, { "category": "self", "summary": "SUSE Bug 1123933", "url": "https://bugzilla.suse.com/1123933" }, { "category": "self", "summary": "SUSE Bug 1124055", "url": "https://bugzilla.suse.com/1124055" }, { "category": "self", "summary": "SUSE Bug 1124204", "url": "https://bugzilla.suse.com/1124204" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124579", "url": "https://bugzilla.suse.com/1124579" }, { "category": "self", "summary": "SUSE Bug 1124589", "url": "https://bugzilla.suse.com/1124589" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1124969", "url": "https://bugzilla.suse.com/1124969" }, { "category": "self", "summary": "SUSE Bug 1124974", "url": "https://bugzilla.suse.com/1124974" }, { "category": "self", "summary": "SUSE Bug 1124975", "url": "https://bugzilla.suse.com/1124975" }, { "category": "self", "summary": "SUSE Bug 1124976", "url": "https://bugzilla.suse.com/1124976" }, { "category": "self", "summary": "SUSE Bug 1124978", "url": "https://bugzilla.suse.com/1124978" }, { "category": "self", "summary": "SUSE Bug 1124979", "url": "https://bugzilla.suse.com/1124979" }, { "category": "self", "summary": "SUSE Bug 1124980", "url": "https://bugzilla.suse.com/1124980" }, { "category": "self", "summary": "SUSE Bug 1124981", "url": "https://bugzilla.suse.com/1124981" }, { "category": "self", "summary": "SUSE Bug 1124982", "url": "https://bugzilla.suse.com/1124982" }, { "category": "self", "summary": "SUSE Bug 1124984", "url": "https://bugzilla.suse.com/1124984" }, { "category": "self", "summary": "SUSE Bug 1124985", "url": "https://bugzilla.suse.com/1124985" }, { "category": "self", "summary": "SUSE Bug 1125109", "url": "https://bugzilla.suse.com/1125109" }, { "category": "self", "summary": "SUSE Bug 1125125", "url": "https://bugzilla.suse.com/1125125" }, { "category": "self", "summary": "SUSE Bug 1125252", "url": "https://bugzilla.suse.com/1125252" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125614", "url": "https://bugzilla.suse.com/1125614" }, { "category": "self", "summary": "SUSE Bug 1125728", "url": "https://bugzilla.suse.com/1125728" }, { "category": "self", "summary": "SUSE Bug 1125780", "url": "https://bugzilla.suse.com/1125780" }, { "category": "self", "summary": "SUSE Bug 1125797", "url": "https://bugzilla.suse.com/1125797" }, { "category": "self", "summary": "SUSE Bug 1125799", "url": "https://bugzilla.suse.com/1125799" }, { "category": "self", "summary": "SUSE Bug 1125800", "url": "https://bugzilla.suse.com/1125800" }, { "category": "self", "summary": "SUSE Bug 1125907", "url": "https://bugzilla.suse.com/1125907" }, { "category": "self", "summary": "SUSE Bug 1125947", "url": "https://bugzilla.suse.com/1125947" }, { "category": "self", "summary": "SUSE Bug 1126131", "url": "https://bugzilla.suse.com/1126131" }, { "category": "self", "summary": "SUSE Bug 1126209", "url": "https://bugzilla.suse.com/1126209" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126393", "url": "https://bugzilla.suse.com/1126393" }, { "category": "self", "summary": "SUSE Bug 1126476", "url": "https://bugzilla.suse.com/1126476" }, { "category": "self", "summary": "SUSE Bug 1126480", "url": "https://bugzilla.suse.com/1126480" }, { "category": "self", "summary": "SUSE Bug 1126481", "url": "https://bugzilla.suse.com/1126481" }, { "category": "self", "summary": "SUSE Bug 1126488", "url": "https://bugzilla.suse.com/1126488" }, { "category": "self", "summary": "SUSE Bug 1126495", "url": "https://bugzilla.suse.com/1126495" }, { "category": "self", "summary": "SUSE Bug 1126555", "url": "https://bugzilla.suse.com/1126555" }, { "category": "self", "summary": "SUSE Bug 1126579", "url": "https://bugzilla.suse.com/1126579" }, { "category": "self", "summary": "SUSE Bug 1126789", "url": "https://bugzilla.suse.com/1126789" }, { "category": "self", "summary": "SUSE Bug 1126790", "url": "https://bugzilla.suse.com/1126790" }, { "category": "self", "summary": "SUSE Bug 1126802", "url": "https://bugzilla.suse.com/1126802" }, { "category": "self", "summary": "SUSE Bug 1126803", "url": "https://bugzilla.suse.com/1126803" }, { "category": "self", "summary": "SUSE Bug 1126804", "url": "https://bugzilla.suse.com/1126804" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1126806", "url": "https://bugzilla.suse.com/1126806" }, { "category": "self", "summary": "SUSE Bug 1126807", "url": "https://bugzilla.suse.com/1126807" }, { "category": "self", "summary": "SUSE Bug 1127042", "url": "https://bugzilla.suse.com/1127042" }, { "category": "self", "summary": "SUSE Bug 1127062", "url": "https://bugzilla.suse.com/1127062" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127154", "url": "https://bugzilla.suse.com/1127154" }, { "category": "self", "summary": "SUSE Bug 1127285", "url": "https://bugzilla.suse.com/1127285" }, { "category": "self", "summary": "SUSE Bug 1127286", "url": "https://bugzilla.suse.com/1127286" }, { "category": "self", "summary": "SUSE Bug 1127307", "url": "https://bugzilla.suse.com/1127307" }, { "category": "self", "summary": "SUSE Bug 1127363", "url": "https://bugzilla.suse.com/1127363" }, { "category": "self", "summary": "SUSE Bug 1127493", "url": "https://bugzilla.suse.com/1127493" }, { "category": "self", "summary": "SUSE Bug 1127494", "url": "https://bugzilla.suse.com/1127494" }, { "category": "self", "summary": "SUSE Bug 1127495", "url": "https://bugzilla.suse.com/1127495" }, { "category": "self", "summary": "SUSE Bug 1127496", "url": "https://bugzilla.suse.com/1127496" }, { "category": "self", "summary": "SUSE Bug 1127497", "url": "https://bugzilla.suse.com/1127497" }, { "category": "self", "summary": "SUSE Bug 1127498", "url": "https://bugzilla.suse.com/1127498" }, { "category": "self", "summary": "SUSE Bug 1127534", "url": "https://bugzilla.suse.com/1127534" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127567", "url": "https://bugzilla.suse.com/1127567" }, { "category": "self", "summary": "SUSE Bug 1127595", "url": "https://bugzilla.suse.com/1127595" }, { "category": "self", "summary": "SUSE Bug 1127603", "url": "https://bugzilla.suse.com/1127603" }, { "category": "self", "summary": "SUSE Bug 1127682", "url": "https://bugzilla.suse.com/1127682" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127750", "url": "https://bugzilla.suse.com/1127750" }, { "category": "self", "summary": "SUSE Bug 1127836", "url": "https://bugzilla.suse.com/1127836" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128094", "url": "https://bugzilla.suse.com/1128094" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128351", "url": "https://bugzilla.suse.com/1128351" }, { "category": "self", "summary": "SUSE Bug 1128451", "url": "https://bugzilla.suse.com/1128451" }, { "category": "self", "summary": "SUSE Bug 1128895", "url": "https://bugzilla.suse.com/1128895" }, { "category": "self", "summary": "SUSE Bug 1129046", "url": "https://bugzilla.suse.com/1129046" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129163", "url": "https://bugzilla.suse.com/1129163" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129181", "url": "https://bugzilla.suse.com/1129181" }, { "category": "self", "summary": "SUSE Bug 1129182", "url": "https://bugzilla.suse.com/1129182" }, { "category": "self", "summary": "SUSE Bug 1129183", "url": "https://bugzilla.suse.com/1129183" }, { "category": "self", "summary": "SUSE Bug 1129184", "url": "https://bugzilla.suse.com/1129184" }, { "category": "self", "summary": "SUSE Bug 1129205", "url": "https://bugzilla.suse.com/1129205" }, { "category": "self", "summary": "SUSE Bug 1129281", "url": "https://bugzilla.suse.com/1129281" }, { "category": "self", "summary": "SUSE Bug 1129284", "url": "https://bugzilla.suse.com/1129284" }, { "category": "self", "summary": "SUSE Bug 1129285", "url": "https://bugzilla.suse.com/1129285" }, { "category": "self", "summary": "SUSE Bug 1129291", "url": "https://bugzilla.suse.com/1129291" }, { "category": "self", "summary": "SUSE Bug 1129292", "url": "https://bugzilla.suse.com/1129292" }, { "category": "self", "summary": "SUSE Bug 1129293", "url": "https://bugzilla.suse.com/1129293" }, { "category": "self", "summary": "SUSE Bug 1129294", "url": "https://bugzilla.suse.com/1129294" }, { "category": "self", "summary": "SUSE Bug 1129295", "url": "https://bugzilla.suse.com/1129295" }, { "category": "self", "summary": "SUSE Bug 1129296", "url": "https://bugzilla.suse.com/1129296" }, { "category": "self", "summary": "SUSE Bug 1129326", "url": "https://bugzilla.suse.com/1129326" }, { "category": "self", "summary": "SUSE Bug 1129327", "url": "https://bugzilla.suse.com/1129327" }, { "category": "self", "summary": "SUSE Bug 1129330", "url": "https://bugzilla.suse.com/1129330" }, { "category": "self", "summary": "SUSE Bug 1129363", "url": "https://bugzilla.suse.com/1129363" }, { "category": "self", "summary": "SUSE Bug 1129366", "url": "https://bugzilla.suse.com/1129366" }, { "category": "self", "summary": "SUSE Bug 1129497", "url": "https://bugzilla.suse.com/1129497" }, { "category": "self", "summary": "SUSE Bug 1129519", "url": "https://bugzilla.suse.com/1129519" }, { "category": "self", "summary": "SUSE Bug 1129543", "url": "https://bugzilla.suse.com/1129543" }, { "category": "self", "summary": "SUSE Bug 1129547", "url": "https://bugzilla.suse.com/1129547" }, { "category": "self", "summary": "SUSE Bug 1129551", "url": "https://bugzilla.suse.com/1129551" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129625", "url": "https://bugzilla.suse.com/1129625" }, { "category": "self", "summary": "SUSE Bug 1129664", "url": "https://bugzilla.suse.com/1129664" }, { "category": "self", "summary": "SUSE Bug 1129739", "url": "https://bugzilla.suse.com/1129739" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 824948", "url": "https://bugzilla.suse.com/824948" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20669 page", "url": "https://www.suse.com/security/cve/CVE-2018-20669/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7308 page", "url": "https://www.suse.com/security/cve/CVE-2019-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8980 page", "url": "https://www.suse.com/security/cve/CVE-2019-8980/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-03-28T07:46:41Z", "generator": { "date": "2019-03-28T07:46:41Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0784-1", "initial_release_date": "2019-03-28T07:46:41Z", "revision_history": [ { "date": "2019-03-28T07:46:41Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "cluster-md-kmp-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "dlm-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "dlm-kmp-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "dtb-al-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-al-4.12.14-150.14.1.aarch64", "product_id": "dtb-al-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-allwinner-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-allwinner-4.12.14-150.14.1.aarch64", "product_id": "dtb-allwinner-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-altera-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-altera-4.12.14-150.14.1.aarch64", "product_id": "dtb-altera-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-amd-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-amd-4.12.14-150.14.1.aarch64", "product_id": "dtb-amd-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-amlogic-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-amlogic-4.12.14-150.14.1.aarch64", "product_id": "dtb-amlogic-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-apm-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-apm-4.12.14-150.14.1.aarch64", "product_id": "dtb-apm-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-arm-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-arm-4.12.14-150.14.1.aarch64", "product_id": "dtb-arm-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-broadcom-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-broadcom-4.12.14-150.14.1.aarch64", "product_id": "dtb-broadcom-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-cavium-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-cavium-4.12.14-150.14.1.aarch64", "product_id": "dtb-cavium-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-exynos-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-exynos-4.12.14-150.14.1.aarch64", "product_id": "dtb-exynos-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-freescale-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-freescale-4.12.14-150.14.1.aarch64", "product_id": "dtb-freescale-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-hisilicon-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-hisilicon-4.12.14-150.14.1.aarch64", "product_id": "dtb-hisilicon-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-lg-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-lg-4.12.14-150.14.1.aarch64", "product_id": "dtb-lg-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-marvell-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-marvell-4.12.14-150.14.1.aarch64", "product_id": "dtb-marvell-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-mediatek-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-mediatek-4.12.14-150.14.1.aarch64", "product_id": "dtb-mediatek-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-nvidia-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-nvidia-4.12.14-150.14.1.aarch64", "product_id": "dtb-nvidia-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-qcom-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-qcom-4.12.14-150.14.1.aarch64", "product_id": "dtb-qcom-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-renesas-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-renesas-4.12.14-150.14.1.aarch64", "product_id": "dtb-renesas-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-rockchip-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-rockchip-4.12.14-150.14.1.aarch64", "product_id": "dtb-rockchip-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-socionext-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-socionext-4.12.14-150.14.1.aarch64", "product_id": "dtb-socionext-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-sprd-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-sprd-4.12.14-150.14.1.aarch64", "product_id": "dtb-sprd-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-xilinx-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-xilinx-4.12.14-150.14.1.aarch64", "product_id": "dtb-xilinx-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "dtb-zte-4.12.14-150.14.1.aarch64", "product": { "name": "dtb-zte-4.12.14-150.14.1.aarch64", "product_id": "dtb-zte-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "gfs2-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "gfs2-kmp-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-default-4.12.14-150.14.2.aarch64", "product_id": "kernel-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-default-base-4.12.14-150.14.2.aarch64", "product_id": "kernel-default-base-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-default-devel-4.12.14-150.14.2.aarch64", "product_id": "kernel-default-devel-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-default-extra-4.12.14-150.14.2.aarch64", "product_id": "kernel-default-extra-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-default-livepatch-4.12.14-150.14.2.aarch64", "product_id": "kernel-default-livepatch-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-obs-build-4.12.14-150.14.2.aarch64", "product_id": "kernel-obs-build-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-obs-qa-4.12.14-150.14.2.aarch64", "product_id": "kernel-obs-qa-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.14.1.aarch64", "product": { "name": "kernel-syms-4.12.14-150.14.1.aarch64", "product_id": "kernel-syms-4.12.14-150.14.1.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-vanilla-4.12.14-150.14.2.aarch64", "product_id": "kernel-vanilla-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-vanilla-base-4.12.14-150.14.2.aarch64", "product_id": "kernel-vanilla-base-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.14.2.aarch64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.14.2.aarch64", "product_id": "kernel-vanilla-devel-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "kselftests-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "kselftests-kmp-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "ocfs2-kmp-default-4.12.14-150.14.2.aarch64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "product_id": "reiserfs-kmp-default-4.12.14-150.14.2.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-150.14.1.noarch", "product": { "name": "kernel-devel-4.12.14-150.14.1.noarch", "product_id": "kernel-devel-4.12.14-150.14.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-150.14.1.noarch", "product": { "name": "kernel-docs-4.12.14-150.14.1.noarch", "product_id": "kernel-docs-4.12.14-150.14.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-150.14.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-150.14.1.noarch", "product_id": "kernel-docs-html-4.12.14-150.14.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-150.14.1.noarch", "product": { "name": "kernel-macros-4.12.14-150.14.1.noarch", "product_id": "kernel-macros-4.12.14-150.14.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-150.14.1.noarch", "product": { "name": "kernel-source-4.12.14-150.14.1.noarch", "product_id": "kernel-source-4.12.14-150.14.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-150.14.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-150.14.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-150.14.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "cluster-md-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "cluster-md-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "cluster-md-kmp-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "dlm-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "dlm-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "dlm-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "dlm-kmp-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "gfs2-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "gfs2-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "gfs2-kmp-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-debug-4.12.14-150.14.2.ppc64le", "product_id": "kernel-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-debug-base-4.12.14-150.14.2.ppc64le", "product_id": "kernel-debug-base-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-debug-devel-4.12.14-150.14.2.ppc64le", "product_id": "kernel-debug-devel-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-extra-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-debug-extra-4.12.14-150.14.2.ppc64le", "product_id": "kernel-debug-extra-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-debug-livepatch-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-debug-livepatch-4.12.14-150.14.2.ppc64le", "product_id": "kernel-debug-livepatch-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-default-4.12.14-150.14.2.ppc64le", "product_id": "kernel-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-default-base-4.12.14-150.14.2.ppc64le", "product_id": "kernel-default-base-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-default-devel-4.12.14-150.14.2.ppc64le", "product_id": "kernel-default-devel-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-default-extra-4.12.14-150.14.2.ppc64le", "product_id": "kernel-default-extra-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "product_id": "kernel-default-livepatch-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "product": { "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "product_id": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-obs-build-4.12.14-150.14.2.ppc64le", "product_id": "kernel-obs-build-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-obs-qa-4.12.14-150.14.2.ppc64le", "product_id": "kernel-obs-qa-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.14.1.ppc64le", "product": { "name": "kernel-syms-4.12.14-150.14.1.ppc64le", "product_id": "kernel-syms-4.12.14-150.14.1.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-vanilla-4.12.14-150.14.2.ppc64le", "product_id": "kernel-vanilla-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "product_id": "kernel-vanilla-base-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.14.2.ppc64le", "product": { "name": "kernel-vanilla-devel-4.12.14-150.14.2.ppc64le", "product_id": "kernel-vanilla-devel-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "kselftests-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "kselftests-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "kselftests-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "kselftests-kmp-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "ocfs2-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "ocfs2-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "ocfs2-kmp-default-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-debug-4.12.14-150.14.2.ppc64le", "product": { "name": "reiserfs-kmp-debug-4.12.14-150.14.2.ppc64le", "product_id": "reiserfs-kmp-debug-4.12.14-150.14.2.ppc64le" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "product": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "product_id": "reiserfs-kmp-default-4.12.14-150.14.2.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.s390x", "product_id": "cluster-md-kmp-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "dlm-kmp-default-4.12.14-150.14.2.s390x", "product_id": "dlm-kmp-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "gfs2-kmp-default-4.12.14-150.14.2.s390x", "product_id": "gfs2-kmp-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-4.12.14-150.14.2.s390x", "product_id": "kernel-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-base-4.12.14-150.14.2.s390x", "product_id": "kernel-default-base-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-devel-4.12.14-150.14.2.s390x", "product_id": "kernel-default-devel-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-extra-4.12.14-150.14.2.s390x", "product_id": "kernel-default-extra-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-livepatch-4.12.14-150.14.2.s390x", "product_id": "kernel-default-livepatch-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-default-man-4.12.14-150.14.2.s390x", "product": { "name": "kernel-default-man-4.12.14-150.14.2.s390x", "product_id": "kernel-default-man-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.14.2.s390x", "product": { "name": "kernel-obs-build-4.12.14-150.14.2.s390x", "product_id": "kernel-obs-build-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.14.2.s390x", "product": { "name": "kernel-obs-qa-4.12.14-150.14.2.s390x", "product_id": "kernel-obs-qa-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.14.1.s390x", "product": { "name": "kernel-syms-4.12.14-150.14.1.s390x", "product_id": "kernel-syms-4.12.14-150.14.1.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.14.2.s390x", "product": { "name": "kernel-vanilla-4.12.14-150.14.2.s390x", "product_id": "kernel-vanilla-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.14.2.s390x", "product": { "name": "kernel-vanilla-base-4.12.14-150.14.2.s390x", "product_id": "kernel-vanilla-base-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.14.2.s390x", "product": { "name": "kernel-vanilla-devel-4.12.14-150.14.2.s390x", "product_id": "kernel-vanilla-devel-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-4.12.14-150.14.2.s390x", "product": { "name": "kernel-zfcpdump-4.12.14-150.14.2.s390x", "product_id": "kernel-zfcpdump-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kernel-zfcpdump-man-4.12.14-150.14.2.s390x", "product": { "name": "kernel-zfcpdump-man-4.12.14-150.14.2.s390x", "product_id": "kernel-zfcpdump-man-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "kselftests-kmp-default-4.12.14-150.14.2.s390x", "product_id": "kselftests-kmp-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.s390x", "product_id": "ocfs2-kmp-default-4.12.14-150.14.2.s390x" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.14.2.s390x", "product": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.s390x", "product_id": "reiserfs-kmp-default-4.12.14-150.14.2.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "cluster-md-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "cluster-md-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "cluster-md-kmp-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "dlm-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "dlm-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "dlm-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "dlm-kmp-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "gfs2-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "gfs2-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "gfs2-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "gfs2-kmp-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-debug-4.12.14-150.14.2.x86_64", "product_id": "kernel-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-debug-base-4.12.14-150.14.2.x86_64", "product_id": "kernel-debug-base-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-150.14.2.x86_64", "product_id": "kernel-debug-devel-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-extra-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-debug-extra-4.12.14-150.14.2.x86_64", "product_id": "kernel-debug-extra-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-debug-livepatch-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-debug-livepatch-4.12.14-150.14.2.x86_64", "product_id": "kernel-debug-livepatch-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-default-4.12.14-150.14.2.x86_64", "product_id": "kernel-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-default-base-4.12.14-150.14.2.x86_64", "product_id": "kernel-default-base-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-default-devel-4.12.14-150.14.2.x86_64", "product_id": "kernel-default-devel-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-extra-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-default-extra-4.12.14-150.14.2.x86_64", "product_id": "kernel-default-extra-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-default-livepatch-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-default-livepatch-4.12.14-150.14.2.x86_64", "product_id": "kernel-default-livepatch-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-150.14.2.x86_64", "product_id": "kernel-kvmsmall-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-150.14.2.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-150.14.2.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "product": { "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "product_id": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-obs-build-4.12.14-150.14.2.x86_64", "product_id": "kernel-obs-build-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-150.14.2.x86_64", "product_id": "kernel-obs-qa-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-150.14.1.x86_64", "product": { "name": "kernel-syms-4.12.14-150.14.1.x86_64", "product_id": "kernel-syms-4.12.14-150.14.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-vanilla-4.12.14-150.14.2.x86_64", "product_id": "kernel-vanilla-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-150.14.2.x86_64", "product_id": "kernel-vanilla-base-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-150.14.2.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-150.14.2.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "kselftests-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "kselftests-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "kselftests-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "kselftests-kmp-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "ocfs2-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "ocfs2-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "ocfs2-kmp-default-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-debug-4.12.14-150.14.2.x86_64", "product": { "name": "reiserfs-kmp-debug-4.12.14-150.14.2.x86_64", "product_id": "reiserfs-kmp-debug-4.12.14-150.14.2.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "product": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "product_id": "reiserfs-kmp-default-4.12.14-150.14.2.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Development Tools 15", "product": { "name": "SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-development-tools:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Legacy 15", "product": { "name": "SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-legacy:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Live Patching 15", "product": { "name": "SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-live-patching:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise High Availability Extension 15", "product": { "name": "SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-ha:15" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Workstation Extension 15", "product": { "name": "SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-we:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64" }, "product_reference": "kernel-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64" }, "product_reference": "kernel-default-base-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-default-base-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-default-base-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-default-base-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64" }, "product_reference": "kernel-default-devel-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-default-devel-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-default-devel-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-man-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-default-man-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-150.14.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch" }, "product_reference": "kernel-devel-4.12.14-150.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-150.14.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch" }, "product_reference": "kernel-macros-4.12.14-150.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-zfcpdump-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15", "product_id": "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-zfcpdump-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-150.14.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch" }, "product_reference": "kernel-docs-4.12.14-150.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64" }, "product_reference": "kernel-obs-build-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-obs-build-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-obs-build-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-150.14.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch" }, "product_reference": "kernel-source-4.12.14-150.14.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.14.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64" }, "product_reference": "kernel-syms-4.12.14-150.14.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.14.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le" }, "product_reference": "kernel-syms-4.12.14-150.14.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.14.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x" }, "product_reference": "kernel-syms-4.12.14-150.14.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-150.14.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-150.14.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x" }, "product_reference": "kernel-vanilla-base-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15", "product_id": "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "reiserfs-kmp-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15", "product_id": "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64" }, "product_reference": "reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le" }, "product_reference": "kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-livepatch-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-default-livepatch-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le" }, "product_reference": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64 as component of SUSE Linux Enterprise Live Patching 15", "product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64" }, "product_reference": "kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "cluster-md-kmp-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64" }, "product_reference": "cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64" }, "product_reference": "dlm-kmp-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "dlm-kmp-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x" }, "product_reference": "dlm-kmp-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "dlm-kmp-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64" }, "product_reference": "dlm-kmp-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x" }, "product_reference": "gfs2-kmp-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "gfs2-kmp-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64" }, "product_reference": "gfs2-kmp-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.14.2.s390x", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "ocfs2-kmp-default-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15", "product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64" }, "product_reference": "ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-extra-4.12.14-150.14.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15", "product_id": "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" }, "product_reference": "kernel-default-extra-4.12.14-150.14.2.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20669" } ], "notes": [ { "category": "general", "text": "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20669", "url": "https://www.suse.com/security/cve/CVE-2018-20669" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2018-20669", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "important" } ], "title": "CVE-2018-20669" }, { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-3819" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "important" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "important" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7308" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7308", "url": "https://www.suse.com/security/cve/CVE-2019-7308" }, { "category": "external", "summary": "SUSE Bug 1124055 for CVE-2019-7308", "url": "https://bugzilla.suse.com/1124055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "important" } ], "title": "CVE-2019-7308" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "important" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-8980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8980" } ], "notes": [ { "category": "general", "text": "A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8980", "url": "https://www.suse.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "SUSE Bug 1126209 for CVE-2019-8980", "url": "https://bugzilla.suse.com/1126209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "low" } ], "title": "CVE-2019-8980" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.ppc64le", "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150_14-default-1-1.9.3.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-devel-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Basesystem 15:kernel-default-man-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Basesystem 15:kernel-devel-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-macros-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Basesystem 15:kernel-zfcpdump-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-docs-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-obs-build-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-source-4.12.14-150.14.1.noarch", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-syms-4.12.14-150.14.1.x86_64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Development Tools 15:kernel-vanilla-base-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.aarch64", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.ppc64le", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.s390x", "SUSE Linux Enterprise Module for Legacy 15:reiserfs-kmp-default-4.12.14-150.14.2.x86_64", "SUSE Linux Enterprise Workstation Extension 15:kernel-default-extra-4.12.14-150.14.2.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T07:46:41Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
suse-su-2019:0785-1
Vulnerability from csaf_suse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe SUSE Linux Enterprise 15 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).\n- CVE-2019-3819: A flaw was found in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) can cause a system lock up and a denial of service. (bnc#1123161).\n- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).\n- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).\n- CVE-2019-3459, CVE-2019-3460: The Bluetooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n- CVE-2019-7221: The KVM implementation had a Use-after-Free problem (bnc#1124732).\n- CVE-2019-7222: The KVM implementation had an Information Leak (bnc#1124735).\n- CVE-2019-6974: kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandled reference counting because of a race condition, leading to a use-after-free (bnc#1124728).\n- CVE-2018-20669: Missing access control checks in ioctl of gpu/drm/i915 driver were fixed which might have lead to information leaks. (bnc#1122971).\n\nThe following non-security bugs were fixed:\n\n- 6lowpan: iphc: reset mac_header after decompress to fix panic (bsc#1051510).\n- 9p: clear dangling pointers in p9stat_free (bsc#1051510).\n- 9p locks: fix glock.client_id leak in do_lock (bsc#1051510).\n- 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n- 9p/net: put a lower bound on msize (bsc#1051510).\n- 9p: use inode-\u003ei_lock to protect i_size_write() under 32-bit (bsc#1051510).\n- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).\n- acpi/device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).\n- acpi/nfit: Block function zero DSMs (bsc#1051510).\n- acpi/nfit: Fix Address Range Scrub completion tracking (bsc#1124969).\n- acpi/nfit: Fix bus command validation (bsc#1051510).\n- acpi/nfit: Fix command-supported detection (bsc#1051510).\n- acpi/nfit: Fix race accessing memdev in nfit_get_smbios_id() (bsc#1122662).\n- acpi/nfit: Fix user-initiated ARS to be \u0027ARS-long\u0027 rather than \u0027ARS-short\u0027 (bsc#1124969).\n- acpi/numa: Use correct type for printing addresses on i386-PAE (bsc#1051510).\n- acpi/power: Skip duplicate power resource references in _PRx (bsc#1051510).\n- acpi/video: Extend chassis-type detection with a \u0027Lunch Box\u0027 check (bsc#1051510).\n- acpi/video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n- add 1 entry 2bcbd406715dca256912b9c5ae449c7968f15705\n- Add delay-init quirk for Corsair K70 RGB keyboards (bsc#1087092).\n- af_iucv: Move sockaddr length checks to before accessing sa_family in bind and connect handlers (bsc#1051510).\n- alsa: bebob: fix model-id of unit for Apogee Ensemble (bsc#1051510).\n- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n- alsa: compress: Fix stop handling on compressed capture streams (bsc#1051510).\n- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).\n- alsa: hda - Add mute LED support for HP ProBook 470 G5 (bsc#1051510).\n- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).\n- alsa: hda/ca0132 - Fix build error without CONFIG_PCI (bsc#1051510).\n- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).\n- alsa: hda/realtek - Fixed hp_pin no value (bsc#1051510).\n- alsa: hda/realtek - Fix lose hp_pins for disable auto mute (bsc#1051510).\n- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).\n- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).\n- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).\n- alsa: hda/realtek - Use a common helper for hp pin reference (bsc#1051510).\n- alsa: hda - Serialize codec registrations (bsc#1122944).\n- alsa: hda - Use standard device registration for beep (bsc#1122944).\n- alsa: oxfw: add support for APOGEE duet FireWire (bsc#1051510).\n- alsa: usb-audio: Add Opus #3 to quirks for native DSD support (bsc#1051510).\n- alsa: usb-audio: Add support for new T+A USB DAC (bsc#1051510).\n- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).\n- altera-stapl: check for a null key before strcasecmp\u0027ing it (bsc#1051510).\n- amd-xgbe: Fix mdio access for non-zero ports and clause 45 PHYs (bsc#1122927).\n- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).\n- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).\n- arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n- arm: 8802/1: Call syscall_trace_exit even when system call skipped (bsc#1051510).\n- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).\n- arm: 8814/1: mm: improve/fix ARM v7_dma_inv_range() unaligned address handling (bsc#1051510).\n- arm: 8815/1: V7M: align v7m_dma_inv_range() with v7 counterpart (bsc#1051510).\n- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n- arm/arm64: KVM: vgic: Force VM halt when changing the active state of GICv3 PPIs/SGIs (bsc#1051510).\n- arm: cns3xxx: Fix writing to wrong PCI config registers after alignment (bsc#1051510).\n- arm: cns3xxx: Use actual size reads for PCIe (bsc#1051510).\n- arm: imx: update the cpu power up timing setting on i.mx6sx (bsc#1051510).\n- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n- arm: KVM: Fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1051510).\n- arm: mmp/mmp2: fix cpu_is_mmp2() on mmp2-dt (bsc#1051510).\n- arm: OMAP1: ams-delta: Fix possible use of uninitialized field (bsc#1051510).\n- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).\n- arm: OMAP2+: prm44xx: Fix section annotation on omap44xx_prm_enable_io_wakeup (bsc#1051510).\n- arm: pxa: avoid section mismatch warning (bsc#1051510).\n- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).\n- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: dma-sh7760: cleanup a debug printk (bsc#1051510).\n- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).\n- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).\n- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).\n- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).\n- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).\n- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).\n- ASoC: rt5514-spi: Fix potential NULL pointer dereference (bsc#1051510).\n- assoc_array: Fix shortcut creation (bsc#1051510).\n- ata: ahci: mvebu: remove stale comment (bsc#1051510).\n- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).\n- ath9k: dynack: check da-\u003eenabled first in sampling routines (bsc#1051510).\n- ath9k: dynack: make ewma estimation faster (bsc#1051510).\n- ath9k: dynack: use authentication messages for \u0027late\u0027 ack (bsc#1051510).\n- atm: he: fix sign-extension overflow on large shift (bsc#1051510).\n- ax25: fix a use-after-free in ax25_fillin_cb() (networking-stable-19_01_04).\n- ax25: fix possible use-after-free (bsc#1051510).\n- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)\n- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).\n- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).\n- batman-adv: Force mac header to start of data on xmit (bsc#1051510).\n- be2net: do not flip hw_features when VXLANs are added/deleted (bsc#1050252).\n- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).\n- blkdev: avoid migration stalls for blkdev pages (bsc#1084216).\n- blk-mq: fix a hung issue when fsync (bsc#1125252).\n- blk-mq: fix kernel oops in blk_mq_tag_idle() (bsc#1051510).\n- block: break discard submissions into the user defined size (git-fixes).\n- block: cleanup __blkdev_issue_discard() (git-fixes).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- blockdev: Fix livelocks on loop device (bsc#1124984).\n- block: do not deal with discard limit in blkdev_issue_discard() (git-fixes).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128895).\n- block: do not warn when doing fsync on read-only devices (bsc#1125252).\n- block: fix 32 bit overflow in __blkdev_issue_discard() (git-fixes).\n- block: fix infinite loop if the device loses discard capability (git-fixes).\n- block/loop: Use global lock for ioctl() operation (bsc#1124974).\n- block: make sure discard bio is aligned with logical block size (git-fixes).\n- block: make sure writesame bio is aligned with logical block size (git-fixes).\n- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).\n- block/swim3: Fix -EBUSY error when re-opening device after unmount (git-fixes).\n- Bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).\n- Bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).\n- bnx2x: Assign unique DMAE channel number for FW DMAE transactions (bsc#1086323).\n- bnx2x: Clear fip MAC when fcoe offload support is disabled (bsc#1086323).\n- bnx2x: Fix NULL pointer dereference in bnx2x_del_all_vlans() on some hw (bsc#1086323).\n- bnx2x: Remove configured vlans as part of unload sequence (bsc#1086323).\n- bnx2x: Send update-svid ramrod with retry/poll flags enabled (bsc#1086323).\n- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282).\n- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).\n- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).\n- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).\n- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1083647).\n- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).\n- bpf: Fix syscall\u0027s stackmap lookup potential deadlock (bsc#1083647).\n- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).\n- bpf/verifier: fix verifier instability (bsc#1056787).\n- bsg: allocate sense buffer if requested (bsc#1106811).\n- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).\n- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).\n- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).\n- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).\n- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).\n- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).\n- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).\n- btrfs: fix fsync after succession of renames of different files (bsc#1126481).\n- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).\n- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).\n- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).\n- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).\n- btrfs: Improve btrfs_search_slot description (bsc#1126802).\n- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1063638).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).\n- btrfs: qgroup: Fix root item corruption when multiple same source snapshots are created with quota enabled (bsc#1122324).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).\n- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).\n- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1063638).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).\n- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).\n- btrfs: remove always true check in unlock_up (bsc#1126802).\n- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).\n- btrfs: remove unnecessary level check in balance_level (bsc#1126802).\n- btrfs: remove unused check of skip_locking (bsc#1126802).\n- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).\n- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).\n- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n- btrfs: split btrfs_extent_same (bsc#1127493).\n- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).\n- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).\n- can: bcm: check timer values before ktime conversion (bsc#1051510).\n- can: dev: __can_get_echo_skb(): fix bogous check for non-existing skb by removing it (bsc#1051510).\n- can: gw: ensure DLC boundaries after CAN frame modification (bsc#1051510).\n- cdc-acm: fix abnormal DATA RX issue for Mediatek Preloader (bsc#1051510).\n- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126790).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).\n- cfg80211: extend range deviation for DMG (bsc#1051510).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- char/mwave: fix potential Spectre v1 vulnerability (bsc#1051510).\n- checkstack.pl: fix for aarch64 (bsc#1051510).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: add missing debug entries for kconfig options (bsc#1051510).\n- cifs: add missing support for ACLs in SMB 3.11 (bsc#1051510).\n- cifs: add sha512 secmech (bsc#1051510).\n- cifs: Add support for reading attributes on SMB2+ (bsc#1051510).\n- cifs: Add support for writing attributes on SMB2+ (bsc#1051510).\n- cifs: Always resolve hostname before reconnecting (bsc#1051510).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).\n- cifs: do not log STATUS_NOT_FOUND errors for DFS (bsc#1051510).\n- cifs: Do not modify mid entry after submitting I/O in cifs_call_async (bsc#1051510).\n- cifs: Fix error mapping for SMB2_LOCK command which caused OFD lock problem (bsc#1051510).\n- cifs: Fix memory leak in smb2_set_ea() (bsc#1051510).\n- cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n- cifs: fix return value for cifs_listxattr (bsc#1051510).\n- cifs: Fix separator when building path from dentry (bsc#1051510).\n- cifs: fix set info (bsc#1051510).\n- cifs: fix sha512 check in cifs_crypto_secmech_release (bsc#1051510).\n- cifs: fix wrapping bugs in num_entries() (bsc#1051510).\n- cifs: For SMB2 security informaion query, check for minimum sized security descriptor instead of sizeof FileAllInformation class (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: hide unused functions (bsc#1051510).\n- cifs: implement v3.11 preauth integrity (bsc#1051510).\n- cifs: invalidate cache when we truncate a file (bsc#1051510).\n- cifs: make \u0027nodfs\u0027 mount opt a superblock flag (bsc#1051510).\n- cifs: OFD locks do not conflict with eachothers (bsc#1051510).\n- cifs: prevent integer overflow in nxt_dir_entry() (bsc#1051510).\n- cifs: prototype declaration and definition for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: prototype declaration and definition to set acl for smb 2 - 3 and cifsacl mount options (bsc#1051510).\n- cifs: refactor crypto shash/sdesc allocation\u0026free (bsc#1051510).\n- cifs: smb2ops: Fix listxattr() when there are no EAs (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options getacl functions (bsc#1051510).\n- cifs: Use smb 2 - 3 and cifsacl mount options setacl function (bsc#1051510).\n- cifs: Use ULL suffix for 64-bit constant (bsc#1051510).\n- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).\n- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).\n- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).\n- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).\n- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).\n- clk: imx6q: reset exclusive gates on init (bsc#1051510).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).\n- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).\n- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).\n- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).\n- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).\n- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).\n- clk: rockchip: fix typo in rk3188 spdif_frac parent (bsc#1051510).\n- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).\n- clk: socfpga: fix refcount leak (bsc#1051510).\n- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).\n- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).\n- clk: sunxi-ng: enable so-said LDOs for A64 SoC\u0027s pll-mipi clock (bsc#1051510).\n- clk: sunxi-ng: h3/h5: Fix CSI_MCLK parent (bsc#1051510).\n- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).\n- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).\n- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).\n- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).\n- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).\n- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).\n- configfs: fix registered group removal (bsc#1051510).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).\n- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).\n- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).\n- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).\n- cpufreq: imx6q: add return value check for voltage scale (bsc#1051510).\n- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).\n- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n- cramfs: fix abad comparison when wrap-arounds occur (bsc#1051510).\n- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).\n- crypto: ahash - fix another early termination in hash walk (bsc#1051510).\n- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).\n- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).\n- crypto: authencesn - Avoid twice completion call in decrypt path (bsc#1051510).\n- crypto: authenc - fix parsing key with misaligned rta_len (bsc#1051510).\n- crypto: bcm - convert to use crypto_authenc_extractkeys() (bsc#1051510).\n- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).\n- crypto: caam - fixed handling of sg list (bsc#1051510).\n- crypto: caam - fix zero-length buffer DMA mapping (bsc#1051510).\n- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).\n- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).\n- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).\n- crypto: hash - set CRYPTO_TFM_NEED_KEY if -\u003esetkey() fails (bsc#1051510).\n- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).\n- crypto: tgr192 - fix unaligned memory access (bsc#1051510).\n- crypto: user - support incremental algorithm dumps (bsc#1120902).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).\n- cw1200: drop useless LIST_HEAD (bsc#1051510).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).\n- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).\n- debugfs: fix debugfs_rename parameter checking (bsc#1051510).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).\n- dlm: fixed memory leaks after failed ls_remove_names allocation (bsc#1051510).\n- dlm: lost put_lkb on error path in receive_convert() and receive_unlock() (bsc#1051510).\n- dlm: memory leaks on error path in dlm_user_request() (bsc#1051510).\n- dlm: possible memory leak on error path in create_lkb() (bsc#1051510).\n- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: at_hdmac: fix memory leak in at_dma_xlate() (bsc#1051510).\n- dmaengine: at_hdmac: fix module unloading (bsc#1051510).\n- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).\n- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).\n- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).\n- dmaengine: dma-jz4780: Return error if not probed from DT (bsc#1051510).\n- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).\n- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: dw: Fix FIFO size for Intel Merrifield (bsc#1051510).\n- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).\n- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).\n- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).\n- dmaengine: xilinx_dma: Remove __aligned attribute on zynqmp_dma_desc_ll (bsc#1051510).\n- dma: Introduce dma_max_mapping_size() (bsc#1120008).\n- dm cache metadata: verify cache has blocks in blocks_are_clean_separate_dirty() (git-fixes).\n- dm: call blk_queue_split() to impose device limits on bios (git-fixes).\n- dm: do not allow readahead to limit IO size (git-fixes).\n- dm thin: send event about thin-pool state change _after_ making it (git-fixes).\n- dm zoned: Fix target BIO completion handling (git-fixes).\n- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).\n- doc/README.SUSE: Correct description for building a kernel (bsc#1123348) The obsoleted make cloneconfig is corrected. Also the order of make scripts and make prepare are corrected as well.\n- Do not log confusing message on reconnect by default (bsc#1129664).\n- Do not log expected error on DFS referral request (bsc#1051510).\n- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).\n- driver core: Move async_synchronize_full call (bsc#1051510).\n- drivers: core: Remove glue dirs from sysfs earlier (bsc#1051510).\n- Drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).\n- Drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).\n- Drivers: hv: vmbus: Remove the useless API vmbus_get_outgoing_channel() (bsc#1127578).\n- Drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).\n- drivers/misc/sgi-gru: fix Spectre v1 vulnerability (bsc#1051510).\n- drivers/net/ethernet/qlogic/qed/qed_rdma.h: fix typo (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- drivers/sbus/char: add of_node_put() (bsc#1051510).\n- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).\n- drm/ast: Fix connector leak during driver unload (bsc#1051510).\n- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).\n- drm/atomic-helper: Complete fake_commit-\u003eflip_done potentially earlier (bsc#1051510).\n- drm: Block fb changes for async plane updates (bsc#1051510).\n- drm/bridge: tc358767: add defines for DP1_SRCCTRL \u0026 PHY_2LANE (bsc#1051510).\n- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).\n- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).\n- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).\n- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).\n- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n- drm: Clear state-\u003eacquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).\n- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).\n- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)\n- drm/etnaviv: potential NULL dereference (bsc#1113722)\n- drm/fb-helper: Partially bring back workaround for bugs of SDL 1.2 (bsc#1113722)\n- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)\n- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)\n- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n- drm/i915/gvt: Fix mmap range check (bsc#1120902)\n- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)\n- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).\n- drm/i915/opregion: fix version check (bsc#1113722)\n- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)\n- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)\n- drm/meson: add missing of_node_put (bsc#1051510).\n- drm/modes: Prevent division by zero htotal (bsc#1051510).\n- drm/msm: Fix error return checking (bsc#1051510).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).\n- drm/msm: Unblock writer if reader closes file (bsc#1051510).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)\n- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).\n- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)\n- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)\n- drm/nouveau/tmr: detect stalled gpu timer and break out of waits (bsc#1123538).\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).\n- drm/rockchip: fix for mailbox read size (bsc#1051510).\n- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)\n- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- drm/vmwgfx: Fix setting of dma masks (bsc#1120902)\n- drm/vmwgfx: Return error code from vmw_execbuf_copy_fence_user (bsc#1120902)\n- e1000e: allow non-monotonic SYSTIM readings (bsc#1051510).\n- earlycon: Initialize port-\u003euartclk based on clock-frequency property (bsc#1051510).\n- earlycon: Remove hardcoded port-\u003euartclk initialization in of_setup_earlycon (bsc#1051510).\n- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).\n- enic: fix checksum validation for IPv6 (bsc#1051510).\n- esp6: fix memleak on error path in esp6_input (bsc#1051510).\n- esp: Fix locking on page fragment allocation (bsc#1051510).\n- esp: Fix memleaks on error paths (bsc#1051510).\n- esp: Fix skb tailroom calculation (bsc#1051510).\n- exportfs: do not read dentry after free (bsc#1051510).\n- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).\n- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).\n- ext4: Fix crash during online resizing (bsc#1122779).\n- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).\n- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).\n- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).\n- fanotify: fix handling of events on child sub-directory (bsc#1122019).\n- fat: validate -\u003ei_start before using (bsc#1051510).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1113722)\n- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).\n- fix smb3-encryption breakage when CONFIG_DEBUG_SG=y (bsc#1051510).\n- floppy: check_events callback should not return a negative number (bsc#1051510).\n- fork: do not copy inconsistent signal handler state to child (bsc#1051510).\n- fork: record start_time late (git-fixes).\n- fork: unconditionally clear stack on fork (git-fixes).\n- fs/cifs: require sha512 (bsc#1051510).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).\n- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).\n- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).\n- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).\n- fuse: handle zero sized retrieve correctly (bsc#1051510).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bsc#1051510).\n- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).\n- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).\n- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).\n- geneve, vxlan: Do not set exceptions if skb-\u003elen \u003c mtu (bsc#1123456).\n- genwqe: Fix size check (bsc#1051510).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bsc#1120601).\n- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).\n- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).\n- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).\n- gpio: altera-a10sr: Set proper output level for direction_output (bsc#1051510).\n- gpio: pcf857x: Fix interrupts on multiple instances (bsc#1051510).\n- gpio: pl061: handle failed allocations (bsc#1051510).\n- gpio: pl061: Move irq_chip definition inside struct pl061 (bsc#1051510).\n- gpio: vf610: Mask all GPIO interrupts (bsc#1051510).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)\n- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).\n- gro_cell: add napi_disable in gro_cells_destroy (networking-stable-19_01_04).\n- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).\n- hfs: do not free node before using (bsc#1051510).\n- hfsplus: do not free node before using (bsc#1051510).\n- hfsplus: prevent btree data loss on root split (bsc#1051510).\n- hfs: prevent btree data loss on root split (bsc#1051510).\n- HID: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).\n- hpet: Fix missing \u0027=\u0027 character in the __setup() code of hpet_mmap_enable (git-fixes).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).\n- hv_uio_generic: map ringbuffer phys addr (bsc#1127578).\n- hv: v4.12 API for hyperv-iommu (bsc#1122822).\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).\n- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).\n- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).\n- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).\n- i2c-axxia: check for error conditions first (bsc#1051510).\n- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).\n- i2c: cadence: Fix the hold bit setting (bsc#1051510).\n- i2c: dev: prevent adapter retries and timeout being set as minus value (bsc#1051510).\n- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).\n- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).\n- i40e: fix mac filter delete when setting mac address (bsc#1056658 bsc#1056662).\n- i40e: report correct statistics when XDP is enabled (bsc#1056658 bsc#1056662).\n- i40e: restore NETIF_F_GSO_IPXIP to netdev features (bsc#1056658 bsc#1056662).\n- IB/core: Destroy QP if XRC QP fails (bsc#1046306).\n- IB/core: Fix potential memory leak while creating MAD agents (bsc#1046306).\n- IB/core: Unregister notifier before freeing MAD security (bsc#1046306).\n- IB/hfi1: Close race condition on user context disable and close (bsc#1060463).\n- IB/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).\n- ibmveth: Do not process frames after calling napi_reschedule (bcs#1123357).\n- ibmveth: fix DMA unmap error in ibmveth_xmit_start error path (networking-stable-19_01_04).\n- ibmvnic: Add ethtool private flag for driver-defined queue limits (bsc#1121726).\n- ibmvnic: Increase maximum queue size limit (bsc#1121726).\n- ibmvnic: Introduce driver limits for ring sizes (bsc#1121726).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- ide: pmac: add of_node_put() (bsc#1051510).\n- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).\n- ieee802154: lowpan_header_create check must check daddr (networking-stable-19_01_04).\n- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).\n- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).\n- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).\n- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).\n- input: bma150 - register input device after setting private data (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G (bsc#1051510).\n- input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).\n- input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).\n- input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).\n- input: omap-keypad - fix idle configuration to not block SoC idle states (bsc#1051510).\n- input: raspberrypi-ts - fix link error (git-fixes).\n- input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).\n- input: restore EV_ABS ABS_RESERVED (bsc#1051510).\n- input: synaptics - enable RMI on ThinkPad T560 (bsc#1051510).\n- input: synaptics - enable SMBus for HP EliteBook 840 G4 (bsc#1051510).\n- input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).\n- input: xpad - add support for SteelSeries Stratus Duo (bsc#1111666).\n- intel_th: Do not reference unassigned outputs (bsc#1051510).\n- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).\n- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).\n- iomap: warn on zero-length mappings (bsc#1127062).\n- iommu/amd: Call free_iova_fast with pfn in map_sg (bsc#1106105).\n- iommu/amd: Fix IOMMU page flush when detach device from a domain (bsc#1106105).\n- iommu/amd: Unmap all mapped pages in error path of map_sg (bsc#1106105).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).\n- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).\n- iommu/vt-d: Fix memory leak in intel_iommu_put_resv_regions() (bsc#1106105).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).\n- ip6mr: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).\n- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).\n- ipmi:pci: Blacklist a Realtek \u0027IPMI\u0027 device (git-fixes).\n- ipmi:ssif: Fix handling of multi-part return messages (bsc#1051510).\n- ip: on queued skb use skb_header_pointer instead of pskb_may_pull (git-fixes).\n- ipsec: check return value of skb_to_sgvec always (bsc#1051510).\n- ipv4: Fix potential Spectre v1 vulnerability (networking-stable-19_01_04).\n- ipv4: ipv6: netfilter: Adjust the frag mem limit when truesize changes (networking-stable-18_12_12).\n- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: addrlabel: per netns list (bsc#1122982).\n- ipv6: Check available headroom in ip6_xmit() even without options (networking-stable-18_12_12).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).\n- ipv6: explicitly initialize udp6_addr in udp_sock_create6() (networking-stable-19_01_04).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).\n- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: sr: properly initialize flowi6 prior passing to ip6_route_output (networking-stable-18_12_12).\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).\n- ipv6: tunnels: fix two use-after-free (networking-stable-19_01_04).\n- ip: validate header length on virtual device xmit (networking-stable-19_01_04).\n- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).\n- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).\n- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).\n- iscsi target: fix session creation failure handling (bsc#1051510).\n- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).\n- isdn: fix kernel-infoleak in capi_unlocked_ioctl (bsc#1051510).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).\n- iser: set sector for ambiguous mr status errors (bsc#1051510).\n- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).\n- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).\n- iwlwifi: mvm: fix RSS config command (bsc#1051510).\n- iwlwifi: pcie: fix emergency path (bsc#1051510).\n- iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).\n- ixgbe: check return value of napi_complete_done() (bsc#1051510).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).\n- jffs2: Fix use of uninitialized delayed_work, lockdep breakage (bsc#1051510).\n- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).\n- kABI: fix xhci kABI stability (bsc#1119086).\n- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).\n- kabi: handle addition of uevent_sock into struct net (bsc#1122982).\n- kABI: Preserve kABI for dma_max_mapping_size() (bsc#1120008).\n- kABI: protect struct sctp_association (kabi).\n- kABI: protect vhost_log_write (kabi).\n- kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n- kABI workaroudn for ath9k ath_node.ackto type change (bsc#1051510).\n- kABI workaround for bt_accept_enqueue() change (bsc#1051510).\n- kABI workaround for deleted snd_hda_register_beep_device() (bsc#1122944).\n- kABI workaround for snd_hda_bus.bus_probing addition (bsc#1122944).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).\n- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).\n- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).\n- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).\n- kernel/exit.c: release ptraced tasks before zap_pid_ns_processes (git-fixes).\n- KEYS: allow reaching the keys quotas exactly (bsc#1051510).\n- keys: Timestamp new keys (bsc#1051510).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).\n- kgdboc: Fix restrict error (bsc#1051510).\n- kgdboc: Fix warning with module build (bsc#1051510).\n- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).\n- kobject: copy env blob in one go (bsc#1122982).\n- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).\n- KVM: arm/arm64: Properly protect VGIC locks from IRQs (bsc#1117155).\n- KVM: arm/arm64: VGIC/ITS: Promote irq_lock() in update_affinity (bsc#1117155).\n- KVM: arm/arm64: VGIC/ITS: protect kvm_read_guest() calls with SRCU lock (bsc#1117155).\n- KVM: arm/arm64: VGIC/ITS save/restore: protect kvm_read_guest() calls (bsc#1117155).\n- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).\n- KVM: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).\n- KVM: PPC: Book3S PR: Set hflag to indicate that POWER9 supports 1T segments (bsc#1124589).\n- kvm: sev: Fail KVM_SEV_INIT if already initialized (bsc#1114279).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- KVM: x86: fix L1TF\u0027s MMIO GFN calculation (bsc#1124204).\n- KVM: x86: Fix single-step debugging (bsc#1129295).\n- KVM: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).\n- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).\n- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).\n- lan78xx: Resolve issue with changing MAC address (bsc#1051510).\n- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).\n- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).\n- libceph: handle an empty authorize reply (bsc#1126789).\n- lib/div64.c: off by one in shift (bsc#1051510).\n- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).\n- libnvdimm/label: Clear \u0027updating\u0027 flag after label-set update (bsc#1129543).\n- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).\n- lib/rbtree-test: lower default params (git-fixes).\n- lightnvm: fail fast on passthrough commands (bsc#1125780).\n- livepatch: Change unsigned long old_addr -\u003e void *old_func in struct klp_func (bsc#1071995).\n- livepatch: Consolidate klp_free functions (bsc#1071995 ).\n- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).\n- livepatch: Define a macro for new API identification (bsc#1071995).\n- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).\n- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).\n- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).\n- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).\n- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).\n- livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).\n- livepatch: Send a fake signal periodically (bsc#1071995 ).\n- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).\n- livepatch: Simplify API by removing registration step (bsc#1071995).\n- llc: do not use sk_eat_skb() (bsc#1051510).\n- lockd: fix access beyond unterminated strings in prints (git-fixes).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: drop caches if offset or block_size are changed (bsc#1124975).\n- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).\n- LSM: Check for NULL cred-security on free (bsc#1051510).\n- mac80211: Add attribute aligned(2) to struct \u0027action\u0027 (bsc#1051510).\n- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).\n- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).\n- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).\n- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).\n- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).\n- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).\n- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).\n- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).\n- media: firewire: Fix app_info parameter type in avc_ca{,_app}_info (bsc#1051510).\n- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).\n- media: s5k4ecgx: delete a bogus error message (bsc#1051510).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).\n- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).\n- media: usb: pwc: Do not use coherent DMA buffers for ISO transfer (bsc#1054610).\n- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).\n- media: uvcvideo: Fix \u0027type\u0027 check leading to overflow (bsc#1051510).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).\n- media: v4l2-tpg: array index could become negative (bsc#1051510).\n- media: v4l: ioctl: Validate num_planes for debug messages (bsc#1051510).\n- media: vb2: be sure to unlock mutex on errors (bsc#1051510).\n- media: vb2: vb2_mmap: move lock up (bsc#1051510).\n- media: vivid: fix error handling of kthread_run (bsc#1051510).\n- media: vivid: free bitmap_cap when updating std/timings/etc (bsc#1051510).\n- media: vivid: set min width/height to a value \u003e 0 (bsc#1051510).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).\n- mfd: ab8500-core: Return zero in get_register_interruptible() (bsc#1051510).\n- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).\n- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).\n- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).\n- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).\n- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).\n- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).\n- mfd: tps6586x: Handle interrupts on suspend (bsc#1051510).\n- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).\n- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).\n- misc: atmel-ssc: Fix section annotation on atmel_ssc_get_driver_data (bsc#1051510).\n- misc: hmc6352: fix potential Spectre v1 (bsc#1051510).\n- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).\n- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).\n- misc: mic/scif: fix copy-paste error in scif_create_remote_lookup (bsc#1051510).\n- misc: mic: SCIF Fix scif_get_new_port() error handling (bsc#1051510).\n- misc: sram: enable clock before registering regions (bsc#1051510).\n- misc: sram: fix resource leaks in probe error path (bsc#1051510).\n- misc: ti-st: Fix memory leak in the error path of probe() (bsc#1051510).\n- misc: vexpress: Off by one in vexpress_syscfg_exec() (bsc#1051510).\n- mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).\n- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).\n- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).\n- mmap: relax file size limit for regular files (git fixes (mm/mmap)).\n- mmc: atmel-mci: do not assume idle after atmci_request_end (bsc#1051510).\n- mmc: bcm2835: Fix DMA channel leak on probe error (bsc#1051510).\n- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).\n- mmc: dw_mmc-bluefield: : Fix the license information (bsc#1051510).\n- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).\n- mmc: omap: fix the maximum timeout setting (bsc#1051510).\n- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).\n- mmc: sdhci-iproc: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n- mmc: spi: Fix card detection during probe (bsc#1051510).\n- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).\n- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).\n- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).\n- mm/ksm.c: ignore STABLE_FLAG of rmap_item-\u003eaddress in rmap_walk_ksm() (git fixes (mm/ksm)).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).\n- mm: migrate: lock buffers before migrate_page_move_mapping() (bsc#1084216).\n- mm: migrate: Make buffer_migrate_page_norefs() actually succeed (bsc#1084216)\n- mm: migrate: provide buffer_migrate_page_norefs() (bsc#1084216).\n- mm: migration: factor out code to compute expected number of page references (bsc#1084216).\n- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).\n- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).\n- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).\n- mpt3sas: check sense buffer before copying sense data (bsc#1106811).\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).\n- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).\n- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).\n- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).\n- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).\n- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).\n- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).\n- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).\n- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).\n- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).\n- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).\n- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).\n- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).\n- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).\n- mtd: nand: ifc: update bufnum mask for ver \u003e= 2.0.0 (bsc#1051510).\n- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).\n- mtd: nand: omap2: Fix subpage write (bsc#1051510).\n- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).\n- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).\n- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).\n- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).\n- mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).\n- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).\n- mv88e6060: disable hardware level MAC learning (bsc#1051510).\n- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).\n- neighbour: Avoid writing before skb-\u003ehead in neigh_hh_output() (networking-stable-18_12_12).\n- net: 8139cp: fix a BUG triggered by changing mtu with network traffic (networking-stable-18_12_12).\n- net: add uevent socket member (bsc#1122982).\n- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).\n- net: aquantia: fixed instack structure overflow (git-fixes).\n- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).\n- net: bcmgenet: abort suspend on error (bsc#1051510).\n- net: bcmgenet: code movement (bsc#1051510).\n- net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n- net: bcmgenet: return correct value \u0027ret\u0027 from bcmgenet_power_down (bsc#1051510).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).\n- net: core: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- net: do not call update_pmtu unconditionally (bsc#1123456).\n- net: Do not default Cavium PTP driver to \u0027y\u0027 (bsc#1110096).\n- net: dp83640: expire old TX-skb (networking-stable-19_02_10).\n- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).\n- net: ena: fix race between link up and device initalization (bsc#1083548).\n- netfilter: nf_tables: check the result of dereferencing base_chain-\u003estats (git-fixes).\n- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).\n- net/hamradio/6pack: use mod_timer() to rearm timers (networking-stable-19_01_04).\n- net: hns3: add error handler for hns3_nic_init_vector_data() (bsc#1104353).\n- net: hns3: add handling for big TX fragment (bsc#1104353 ).\n- net: hns3: Fix client initialize state issue when roce client initialize failed (bsc#1104353).\n- net: hns3: Fix for loopback selftest failed problem (bsc#1104353 ).\n- net: hns3: fix for multiple unmapping DMA problem (bsc#1104353 ).\n- net: hns3: Fix tc setup when netdev is first up (bsc#1104353 ).\n- net: hns3: Fix tqp array traversal condition for vf (bsc#1104353 ).\n- net: hns3: move DMA map into hns3_fill_desc (bsc#1104353 ).\n- net: hns3: remove hns3_fill_desc_tso (bsc#1104353).\n- net: hns3: rename hns_nic_dma_unmap (bsc#1104353).\n- net: hns3: rename the interface for init_client_instance and uninit_client_instance (bsc#1104353).\n- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).\n- net: macb: restart tx after tx used bit read (networking-stable-19_01_04).\n- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).\n- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4_en: Change min MTU size to ETH_MIN_MTU (networking-stable-18_12_12).\n- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).\n- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).\n- net/mlx5e: Remove the false indication of software timestamping support (networking-stable-19_01_04).\n- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Release resource on error flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net/mlx5: Typo fix in del_sw_hw_rule (networking-stable-19_01_04).\n- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).\n- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).\n- netns: restrict uevents (bsc#1122982).\n- net: phy: do not allow __set_phy_supported to add unsupported modes (networking-stable-18_12_12).\n- net: phy: Fix the issue that netif always links up after resuming (networking-stable-19_01_04).\n- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).\n- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).\n- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).\n- netrom: fix locking in nr_find_socket() (networking-stable-19_01_04).\n- netrom: switch to sock timer API (bsc#1051510).\n- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).\n- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).\n- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).\n- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).\n- net: skb_scrub_packet(): Scrub offload_fwd_mark (networking-stable-18_12_03).\n- net/smc: fix TCP fallback socket release (networking-stable-19_01_04).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).\n- net: stmmac: Fix PCI module removal leak (git-fixes).\n- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).\n- net: stmmac: Use mutex instead of spinlock (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).\n- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (networking-stable-18_12_03).\n- net: thunderx: set xdp_prog to NULL if bpf_prog_add fails (networking-stable-18_12_03).\n- net/wan: fix a double free in x25_asy_open_tty() (networking-stable-19_01_04).\n- nfit: acpi_nfit_ctl(): Check out_obj-\u003etype in the right place (bsc#1129547).\n- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).\n- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).\n- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n- nfsd: COPY and CLONE operations require the saved filehandle to be set (git-fixes).\n- nfsd: Fix an Oops in free_session() (git-fixes).\n- nfs: Fix a missed page unlock after pg_doio() (git-fixes).\n- NFS: Fix up return value on fatal errors in nfs_page_async_flush() (git-fixes).\n- NFSv4.1: Fix the r/wsize checking (git-fixes).\n- NFSv4: Do not exit the state manager without clearing NFS4CLNT_MANAGER_RUNNING (git-fixes).\n- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).\n- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).\n- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).\n- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).\n- nvme: kABI fix for scan_lock (bsc#1123882).\n- nvme: lock NS list changes while handling command effects (bsc#1123882).\n- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).\n- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).\n- nvme-multipath: round-robin I/O policy (bsc#1110705).\n- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).\n- of, numa: Validate some distance map rules (bsc#1051510).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).\n- omap2fb: Fix stack memory disclosure (bsc#1120902)\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).\n- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).\n- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).\n- packet: Do not leak dev refcounts on error exit (git-fixes).\n- packet: validate address length if non-zero (networking-stable-19_01_04).\n- packet: validate address length (networking-stable-19_01_04).\n- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).\n- Partially revert \u0027block: fail op_is_write() requests to (bsc#1125252).\n- PCI: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).\n- PCI: Disable broken RTIT_BAR of Intel TH (bsc#1120318).\n- PCI: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).\n- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).\n- PCI/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).\n- PCI: qcom: Do not deassert reset GPIO during probe (bsc#1129281).\n- pcrypt: use format specifier in kobject_add (bsc#1051510).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phonet: af_phonet: Fix Spectre v1 vulnerability (networking-stable-19_01_04).\n- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).\n- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).\n- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).\n- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).\n- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).\n- phy: tegra: remove redundant self assignment of \u0027map\u0027 (bsc#1051510).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bsc#1051510).\n- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).\n- pinctrl: meson: fix pull enable register calculation (bsc#1051510).\n- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).\n- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).\n- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).\n- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).\n- platform/x86: asus-nb-wmi: Drop mapping of 0x33 and 0x34 scan codes (bsc#1051510).\n- platform/x86: asus-nb-wmi: Map 0x35 to KEY_SCREENLOCK (bsc#1051510).\n- platform/x86: asus-wmi: Tell the EC the OS will handle the display off hotkey (bsc#1051510).\n- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).\n- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).\n- powerpc: Always save/restore checkpointed regs during treclaim/trecheckpoint (bsc#1118338).\n- powerpc/cacheinfo: Report the correct shared_cpu_map on big-cores (bsc#1109695).\n- powerpc: Detect the presence of big-cores via \u0027ibm, thread-groups\u0027 (bsc#1109695).\n- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).\n- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).\n- powerpc: make use of for_each_node_by_type() instead of open-coding it (bsc#1109695).\n- powerpc/powernv: Clear LPCR[PECE1] via stop-api only for deep state offline (bsc#1119766, bsc#1055121).\n- powerpc/powernv: Clear PECE1 in LPCR via stop-api only on Hotplug (bsc#1119766, bsc#1055121).\n- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).\n- powerpc: Remove facility loadups on transactional {fp, vec, vsx} unavailable (bsc#1118338).\n- powerpc: Remove redundant FP/Altivec giveup code (bsc#1118338).\n- powerpc/setup: Add cpu_to_phys_id array (bsc#1109695).\n- powerpc/smp: Add cpu_l2_cache_map (bsc#1109695).\n- powerpc/smp: Add Power9 scheduler topology (bsc#1109695).\n- powerpc/smp: Rework CPU topology construction (bsc#1109695).\n- powerpc/smp: Use cpu_to_chip_id() to find core siblings (bsc#1109695).\n- powerpc/tm: Avoid machine crash on rt_sigreturn (bsc#1118338).\n- powerpc/tm: Do not check for WARN in TM Bad Thing handling (bsc#1118338).\n- powerpc/tm: Fix comment (bsc#1118338).\n- powerpc/tm: Fix endianness flip on trap (bsc#1118338).\n- powerpc/tm: Fix HFSCR bit for no suspend case (bsc#1118338).\n- powerpc/tm: Fix HTM documentation (bsc#1118338).\n- powerpc/tm: Limit TM code inside PPC_TRANSACTIONAL_MEM (bsc#1118338).\n- powerpc/tm: P9 disable transactionally suspended sigcontexts (bsc#1118338).\n- powerpc/tm: Print 64-bits MSR (bsc#1118338).\n- powerpc/tm: Print scratch value (bsc#1118338).\n- powerpc/tm: Reformat comments (bsc#1118338).\n- powerpc/tm: Remove msr_tm_active() (bsc#1118338).\n- powerpc/tm: Remove struct thread_info param from tm_reclaim_thread() (bsc#1118338).\n- powerpc/tm: Save MSR to PACA before RFID (bsc#1118338).\n- powerpc/tm: Set MSR[TS] just prior to recheckpoint (bsc#1118338, bsc#1120955).\n- powerpc/tm: Unset MSR[TS] if not recheckpointing (bsc#1118338).\n- powerpc/tm: Update function prototype comment (bsc#1118338).\n- powerpc: Use cpu_smallcore_sibling_mask at SMT level on bigcores (bsc#1109695).\n- powerpc/xmon: Fix invocation inside lock region (bsc#1122885).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- pstore/ram: Avoid allocation and leak of platform data (bsc#1051510).\n- pstore/ram: Avoid NULL deref in ftrace merging failure path (bsc#1051510).\n- pstore/ram: Correctly calculate usable PRZ bytes (bsc#1051510).\n- pstore/ram: Do not treat empty buffers as valid (bsc#1051510).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).\n- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).\n- ptp_kvm: probe for kvm guest availability (bsc#1098382).\n- ptr_ring: wrap back -\u003eproducer in __ptr_ring_swap_queue() (networking-stable-19_01_04).\n- qed: Avoid constant logical operation warning in qed_vf_pf_acquire (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Avoid implicit enum conversion in qed_iwarp_parse_rx_pkt (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_roce_mode_to_flavor (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Avoid implicit enum conversion in qed_set_tunn_cls_info (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix an error code qed_ll2_start_xmit() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix bitmap_weight() check (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix blocking/unlimited SPQ entries leak (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix command number mismatch between driver and the mfw (bsc#1086314 bsc#1086313 bsc#1086301 ).\n- qed: Fix mask parameter in qed_vf_prep_tunn_req_tlv (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix memory/entry leak in qed_init_sp_request() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix potential memory corruption (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix PTT leak in qed_drain() (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix QM getters to always return a valid pq (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix rdma_info structure allocation (bsc#1086314 bsc#1086313 bsc#1086301).\n- qed: Fix reading wrong value in loop condition (bsc#1086314 bsc#1086313 bsc#1086301).\n- qla2xxx: Fixup dual-protocol FCP connections (bsc#1108870).\n- qmi_wwan: Added support for Fibocom NL668 series (networking-stable-19_01_04).\n- qmi_wwan: Added support for Telit LN940 series (networking-stable-19_01_04).\n- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).\n- qmi_wwan: Add support for Fibocom NL678 series (networking-stable-19_01_04).\n- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).\n- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).\n- rapidio/rionet: do not free skb before reading its length (networking-stable-18_12_03).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).\n- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).\n- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).\n- RDMA/core: Fix unwinding flow in case of error to register device (bsc#1046306).\n- RDMA/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).\n- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).\n- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).\n- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).\n- Remove blacklist of virtio patch so we can install it (bsc#1114585)\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1051510).\n- Revert \u0027Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G\u0027 (bsc#1051510).\n- Revert \u0027openvswitch: Fix template leak in error cases.\u0027 (bsc#1051510).\n- Revert \u0027scsi: qla2xxx: Fix NVMe Target discovery\u0027 (bsc#1125252).\n- Revert \u0027serial: 8250: Fix clearing FIFOs in RS485 mode again\u0027 (bsc#1051510).\n- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.\n- Revert \u0027xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue\u0027 (bsc#1120854).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).\n- rpm/kernel-binary.spec.in: fix initrd permissions (bsc#1123697)\n- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)\n- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).\n- rtnetlink: ndo_dflt_fdb_dump() only work for ARPHRD_ETHER devices (networking-stable-18_12_12).\n- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).\n- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).\n- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).\n- s390/early: improve machine detection (git-fixes).\n- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).\n- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).\n- s390/qeth: fix use-after-free in error path (bsc#1127534).\n- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).\n- s390/sthyi: Fix machine name validity indication (git-fixes).\n- s390/zcrypt: fix specification exception on z196 during ap probe (LTC#174936, bsc#1123061).\n- sata_rcar: fix deferred probing (bsc#1051510).\n- sbus: char: add of_node_put() (bsc#1051510).\n- sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).\n- sched/wait: Fix rcuwait_wake_up() ordering (git-fixes).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- sch_multiq: fix double free on init failure (bsc#1051510).\n- scripts/git_sort/git_sort.py: Add mkp/scsi 5.0/scsi-fixes\n- scripts/git_sort/git_sort.py: Add s390/linux.git fixes.\n- scripts/git_sort/git_sort.py: add vfs \u0027fixes\u0027 branch\n- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).\n- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).\n- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).\n- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).\n- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).\n- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).\n- scsi: lpfc: fix remoteport access (bsc#1125252).\n- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).\n- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).\n- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).\n- scsi: mpt3sas: Add ioc_\u003clevel\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u003clevel\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u003clevel\u003e with MPT3SAS_FMT to ioc_\u003clevel\u003e (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).\n- scsi: qedi: Add ep_state for login completion on un-reachable targets (bsc#1113712).\n- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).\n- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).\n- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).\n- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).\n- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).\n- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).\n- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).\n- scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n- scsi: qla2xxx: Timeouts occur on surprise removal of QLogic adapter (bsc#1124985).\n- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).\n- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: target: make the pi_prot_format ConfigFS path readable (bsc#1123933).\n- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).\n- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).\n- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).\n- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).\n- sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_event (networking-stable-19_01_04).\n- sctp: kfree_rcu asoc (networking-stable-18_12_12).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).\n- selftests/livepatch: introduce tests (bsc#1071995).\n- selftests/powerpc: Use snprintf to construct DSCR sysfs interface paths (bsc#1124579).\n- selinux: Add __GFP_NOWARN to allocation at str_read() (bsc#1051510).\n- selinux: always allow mounting submounts (bsc#1051510).\n- selinux: fix GPF on invalid policy (bsc#1051510).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).\n- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).\n- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).\n- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).\n- serial: imx: fix error handling in console_setup (bsc#1051510).\n- serial: set suppress_bind_attrs flag only if builtin (bsc#1051510).\n- serial/sunsu: fix refcount leak (bsc#1051510).\n- serial: uartps: Fix interrupt mask issue to handle the RX interrupts properly (bsc#1051510).\n- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).\n- signal: Always deliver the kernel\u0027s SIGKILL and SIGSTOP to a pid namespace init (git-fixes).\n- skge: potential memory corruption in skge_get_regs() (bsc#1051510).\n- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).\n- sky2: Increase D3 delay again (bsc#1051510).\n- slab: alien caches must not be initialized if the allocation of the alien cache failed (git fixes (mm/slab)).\n- smb3.1.1 dialect is no longer experimental (bsc#1051510).\n- smb311: Fix reconnect (bsc#1051510).\n- smb311: Improve checking of negotiate security contexts (bsc#1051510).\n- smb3: Add support for multidialect negotiate (SMB2.1 and later) (bsc#1051510).\n- smb3: allow stats which track session and share reconnects to be reset (bsc#1051510).\n- smb3: Backup intent flag missing for directory opens with backupuid mounts (bsc#1051510).\n- smb3: check for and properly advertise directory lease support (bsc#1051510).\n- smb3: directory sync should not return an error (bsc#1051510).\n- smb3: do not attempt cifs operation in smb3 query info error path (bsc#1051510).\n- smb3: do not request leases in symlink creation and query (bsc#1051510).\n- smb3: Do not send SMB3 SET_INFO if nothing changed (bsc#1051510).\n- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n- smb3: enumerating snapshots was leaving part of the data off end (bsc#1051510).\n- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).\n- smb3: Fix length checking of SMB3.11 negotiate request (bsc#1051510).\n- smb3: Fix root directory when server returns inode number of zero (bsc#1051510).\n- smb3: fix various xid leaks (bsc#1051510).\n- smb3: Improve security, move default dialect to SMB3 from old CIFS (bsc#1051510).\n- smb3: on kerberos mount if server does not specify auth type use krb5 (bsc#1051510).\n- smb3: Remove ifdef since SMB3 (and later) now STRONGLY preferred (bsc#1051510).\n- smb3: remove noisy warning message on mount (bsc#1129664).\n- smb3: simplify code by removing CONFIG_CIFS_SMB311 (bsc#1051510).\n- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).\n- soc/tegra: Do not leak device tree node reference (bsc#1051510).\n- splice: do not merge into linked buffers (git-fixes).\n- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).\n- staging: iio: ad7780: update voltage on read (bsc#1051510).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).\n- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).\n- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).\n- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).\n- staging: rtl8188eu: Add device code for D-Link DWA-121 rev B1 (bsc#1051510).\n- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).\n- staging: speakup: Replace strncpy with memcpy (bsc#1051510).\n- staging: wilc1000: fix to set correct value for \u0027vif_num\u0027 (bsc#1051510).\n- sunrpc: correct the computation for page_ptr when truncating (git-fixes).\n- sunrpc: Fix a potential race in xprt_connect() (git-fixes).\n- sunrpc: Fix leak of krb5p encode pages (git-fixes).\n- sunrpc: handle ENOMEM in rpcb_getport_async (git-fixes).\n- sunrpc: safely reallow resvport min/max inversion (git-fixes).\n- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).\n- swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).\n- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).\n- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).\n- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).\n- tcp: batch tcp_net_metrics_exit (bsc#1122982).\n- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).\n- tcp: Do not underestimate rwnd_limited (networking-stable-18_12_12).\n- tcp: fix a race in inet_diag_dump_icsk() (networking-stable-19_01_04).\n- tcp: fix NULL ref in tail loss probe (networking-stable-18_12_12).\n- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).\n- tcp: lack of available data can also cause TSO defer (git-fixes).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).\n- team: Free BPF filter when unregistering netdev (bsc#1051510).\n- The PCI SSID matches with other machine(s?) on the market, and leads to the boot problem. (bsc#1122554) \n- There are no more #ifdef checking these macros.\n- Thermal: do not clear passive state during system sleep (bsc#1051510).\n- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).\n- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).\n- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).\n- thermal: int340x_thermal: Fix a NULL vs IS_ERR() check (bsc#1051510).\n- thermal: mediatek: fix register index error (bsc#1051510).\n- timekeeping: Use proper seqcount initializer (bsc#1051510).\n- tipc: compare remote and local protocols in tipc_udp_enable() (networking-stable-19_01_04).\n- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).\n- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).\n- tipc: fix a double kfree_skb() (networking-stable-19_01_04).\n- tipc: fix a race condition of releasing subscriber object (bsc#1051510).\n- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).\n- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).\n- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).\n- tipc: use lock_sock() in tipc_sk_reinit() (networking-stable-19_01_04).\n- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).\n- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).\n- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).\n- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).\n- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).\n- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).\n- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).\n- tty: Handle problem if line discipline does not have receive_buf (bsc#1051510).\n- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).\n- tty/n_hdlc: fix __might_sleep warning (bsc#1051510).\n- tty/serial: do not free trasnmit buffer page under port lock (bsc#1051510).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).\n- tun: forbid iface creation with rtnl ops (networking-stable-18_12_12).\n- uart: Fix crash in uart_write and uart_put_char (bsc#1051510).\n- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).\n- uevent: add alloc_uevent_skb() helper (bsc#1122982).\n- uio_hv_generic: defer opening vmbus until first use (bsc#1127578).\n- uio_hv_generic: set callbacks on open (bsc#1127578).\n- uio: introduce UIO_MEM_IOVA (bsc#1127578).\n- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).\n- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).\n- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.\n- Update patches.kabi/bpf-prevent-memory-disambiguation-attack.patch (bsc#1087082).\n- Update patches.kabi/bpf-properly-enforce-index-mask-to-prevent-out-of-bo.patch (bsc#1098425).\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).\n- usb: Add new USB LPM helpers (bsc#1120902).\n- usb: Add USB_QUIRK_DELAY_CTRL_MSG quirk for Corsair K70 RGB (bsc#1120902).\n- usb: cdc-acm: send ZLP for Telit 3G Intel based modems (bsc#1120902).\n- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).\n- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).\n- usb: dwc3: gadget: Clear req-\u003eneeds_extra_trb flag on cleanup (bsc#1120902).\n- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).\n- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).\n- usb: dwc3: trace: add missing break statement to make compiler happy (bsc#1120902).\n- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).\n- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).\n- usb: musb: dsps: fix otg state machine (bsc#1051510).\n- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).\n- usbnet: ipheth: fix potential recvmsg bug and recvmsg bug 2 (networking-stable-18_12_03).\n- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n- usb: phy: am335x: fix race condition in _probe (bsc#1051510).\n- usb: serial: option: add Fibocom NL678 series (bsc#1120902).\n- usb: serial: pl2303: add ids for Hewlett-Packard HP POS pole displays (bsc#1120902).\n- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).\n- usb: storage: add quirk for SMI SM3350 (bsc#1120902).\n- usb: storage: do not insert sane sense for SPC3+ when bad sense specified (bsc#1120902).\n- usb: xhci: fix \u0027broken_suspend\u0027 placement in struct xchi_hcd (bsc#1119086).\n- veth: set peer GSO values (bsc#1051510).\n- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n- vfio: ccw: process ssch with interrupts disabled (git-fixes).\n- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).\n- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).\n- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).\n- vhost: log dirty page correctly (networking-stable-19_01_26).\n- vhost: make sure used idx is seen before log in vhost_add_used_n() (networking-stable-19_01_04).\n- vhost/vsock: fix uninitialized vhost_vsock-\u003eguest_cid (bsc#1051510).\n- video: clps711x-fb: release disp device node in probe() (bsc#1051510).\n- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).\n- virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).\n- virtio-net: fail XDP set if guest csum is negotiated (networking-stable-18_12_03).\n- virtio-net: keep vnet header zeroed after processing XDP (networking-stable-18_12_12).\n- virtio/s390: avoid race on vcdev-\u003econfig (git-fixes).\n- virtio/s390: fix race in ccw_io_helper() (git-fixes).\n- vmbus: fix subchannel removal (bsc#1127578).\n- vmbus: keep pointer to ring buffer page (bsc#1127578).\n- vmbus: pass channel to hv_process_channel_removal (bsc#1127578).\n- vmbus: split ring buffer allocation from open (bsc#1127578).\n- VMCI: Support upto 64-bit PPNs (bsc#1127286).\n- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).\n- vsock: Send reset control packet when socket is partially bound (networking-stable-19_01_04).\n- vt: invoke notifier on screen size change (bsc#1051510).\n- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).\n- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling gro_cells_receive() (git-fixes).\n- vxlan: update skb dst pmtu on tx path (bsc#1123456).\n- w90p910_ether: remove incorrect __init annotation (bsc#1051510).\n- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).\n- watchdog: w83627hf_wdt: Add quirk for Inves system (bsc#1106434).\n- writeback: do not decrement wb-\u003erefcnt if !wb-\u003ebdi (git fixes (writeback)).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/a.out: Clear the dump structure initially (bsc#1114279).\n- x86/apic: Provide apic_ack_irq() (bsc#1122822).\n- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).\n- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).\n- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).\n- x86/bugs: Add AMD\u0027s variant of SSB_NO (bsc#1114279).\n- x86/bugs: Update when to check for the LS_CFG SSBD mitigation (bsc#1114279).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).\n- x86/kvmclock: set pvti_cpu0_va after enabling kvmclock (bsc#1098382).\n- x86/MCE: Initialize mce.bank in the case of a fatal error in mce_no_way_out() (bsc#1114279).\n- x86/microcode/amd: Do not falsely trick the late loading mechanism (bsc#1114279).\n- x86/mm: Drop usage of __flush_tlb_all() in kernel_physical_mapping_init() (bsc#1114279).\n- x86, modpost: Replace last remnants of RETPOLINE with CONFIG_RETPOLINE (bsc#1114279).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).\n- x86/pvclock: add setter for pvclock_pvti_cpu0_va (bsc#1098382).\n- x86/resctrl: Fix rdt_find_domain() return value and checks (bsc#1114279).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/speculation: Add RETPOLINE_AMD support to the inline asm CALL_NOSPEC variant (bsc#1114279).\n- x86/speculation: Remove redundant arch_smt_update() invocation (bsc#1114279).\n- x86/vdso: Remove obsolete \u0027fake section table\u0027 reservation (bsc#1114279).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- x86/xen/time: Output xen sched_clock time from 0 (bsc#1098382).\n- x86/xen/time: set pvclock flags on xen_time_init() (bsc#1098382).\n- x86/xen/time: setup vcpu 0 time info page (bsc#1098382).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: fix dom0 boot on huge systems (bsc#1127836).\n- xen: Fix x86 sched_clock() interface for xen (bsc#1098382).\n- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).\n- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).\n- xhci: Add quirk to zero 64bit registers on Renesas PCIe controllers (bsc#1120854).\n- xhci: workaround CSS timeout on AMD SNPS 3.0 xHC (bsc#1119086).\n- xprtrdma: Reset credit grant properly after a disconnect (git-fixes).\n- yama: Check for pid death before checking ancestry (bsc#1051510).\n- yam: fix a missing-check bug (bsc#1051510).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).\n- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2019-785,SUSE-SLE-Module-Public-Cloud-15-2019-785", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0785-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2019:0785-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2019:0785-1", "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190785-1.html" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050252", "url": "https://bugzilla.suse.com/1050252" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1054610", "url": "https://bugzilla.suse.com/1054610" }, { "category": "self", "summary": "SUSE Bug 1055121", "url": "https://bugzilla.suse.com/1055121" }, { "category": "self", "summary": "SUSE Bug 1056658", "url": "https://bugzilla.suse.com/1056658" }, { "category": "self", "summary": "SUSE Bug 1056662", "url": "https://bugzilla.suse.com/1056662" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1063638", "url": "https://bugzilla.suse.com/1063638" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1070995", "url": "https://bugzilla.suse.com/1070995" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1084216", "url": "https://bugzilla.suse.com/1084216" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1086301", "url": "https://bugzilla.suse.com/1086301" }, { "category": "self", "summary": "SUSE Bug 1086313", "url": "https://bugzilla.suse.com/1086313" }, { "category": "self", "summary": "SUSE Bug 1086314", "url": "https://bugzilla.suse.com/1086314" }, { "category": "self", "summary": "SUSE Bug 1086323", "url": "https://bugzilla.suse.com/1086323" }, { "category": "self", "summary": "SUSE Bug 1087082", "url": "https://bugzilla.suse.com/1087082" }, { "category": "self", "summary": "SUSE Bug 1087092", "url": "https://bugzilla.suse.com/1087092" }, { "category": "self", "summary": "SUSE Bug 1088133", "url": "https://bugzilla.suse.com/1088133" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098382", "url": "https://bugzilla.suse.com/1098382" }, { "category": "self", "summary": "SUSE Bug 1098425", "url": "https://bugzilla.suse.com/1098425" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1104353", "url": "https://bugzilla.suse.com/1104353" }, { "category": "self", "summary": "SUSE Bug 1106105", "url": "https://bugzilla.suse.com/1106105" }, { "category": "self", "summary": "SUSE Bug 1106434", "url": "https://bugzilla.suse.com/1106434" }, { "category": "self", "summary": "SUSE Bug 1106811", "url": "https://bugzilla.suse.com/1106811" }, { "category": "self", "summary": "SUSE Bug 1107078", "url": "https://bugzilla.suse.com/1107078" }, { "category": "self", "summary": "SUSE Bug 1107665", "url": "https://bugzilla.suse.com/1107665" }, { "category": "self", "summary": "SUSE Bug 1108101", "url": "https://bugzilla.suse.com/1108101" }, { "category": "self", "summary": "SUSE Bug 1108870", "url": "https://bugzilla.suse.com/1108870" }, { "category": "self", "summary": "SUSE Bug 1109695", "url": "https://bugzilla.suse.com/1109695" }, { "category": "self", "summary": "SUSE Bug 1110096", "url": "https://bugzilla.suse.com/1110096" }, { "category": "self", "summary": "SUSE Bug 1110705", "url": "https://bugzilla.suse.com/1110705" }, { "category": "self", "summary": "SUSE Bug 1111666", "url": "https://bugzilla.suse.com/1111666" }, { "category": "self", "summary": "SUSE Bug 1113042", "url": "https://bugzilla.suse.com/1113042" }, { "category": "self", "summary": "SUSE Bug 1113712", "url": "https://bugzilla.suse.com/1113712" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113939", "url": "https://bugzilla.suse.com/1113939" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114585", "url": "https://bugzilla.suse.com/1114585" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117155", "url": "https://bugzilla.suse.com/1117155" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1118338", "url": "https://bugzilla.suse.com/1118338" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119086", "url": "https://bugzilla.suse.com/1119086" }, { "category": "self", "summary": "SUSE Bug 1119766", "url": "https://bugzilla.suse.com/1119766" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120008", "url": "https://bugzilla.suse.com/1120008" }, { "category": "self", "summary": "SUSE Bug 1120318", "url": "https://bugzilla.suse.com/1120318" }, { "category": "self", "summary": "SUSE Bug 1120601", "url": "https://bugzilla.suse.com/1120601" }, { "category": "self", "summary": "SUSE Bug 1120758", "url": "https://bugzilla.suse.com/1120758" }, { "category": "self", "summary": "SUSE Bug 1120854", "url": "https://bugzilla.suse.com/1120854" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1120909", "url": "https://bugzilla.suse.com/1120909" }, { "category": "self", "summary": "SUSE Bug 1120955", "url": "https://bugzilla.suse.com/1120955" }, { "category": "self", "summary": "SUSE Bug 1121317", "url": "https://bugzilla.suse.com/1121317" }, { "category": "self", "summary": "SUSE Bug 1121726", "url": "https://bugzilla.suse.com/1121726" }, { "category": "self", "summary": "SUSE Bug 1121789", "url": "https://bugzilla.suse.com/1121789" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122019", "url": "https://bugzilla.suse.com/1122019" }, { "category": "self", "summary": "SUSE Bug 1122192", "url": "https://bugzilla.suse.com/1122192" }, { "category": "self", "summary": "SUSE Bug 1122324", "url": "https://bugzilla.suse.com/1122324" }, { "category": "self", "summary": "SUSE Bug 1122554", "url": "https://bugzilla.suse.com/1122554" }, { "category": "self", "summary": "SUSE Bug 1122662", "url": "https://bugzilla.suse.com/1122662" }, { "category": "self", "summary": "SUSE Bug 1122764", "url": "https://bugzilla.suse.com/1122764" }, { "category": "self", "summary": "SUSE Bug 1122779", "url": "https://bugzilla.suse.com/1122779" }, { "category": "self", "summary": "SUSE Bug 1122822", "url": "https://bugzilla.suse.com/1122822" }, { "category": "self", "summary": "SUSE Bug 1122885", "url": "https://bugzilla.suse.com/1122885" }, { "category": "self", "summary": "SUSE Bug 1122927", "url": "https://bugzilla.suse.com/1122927" }, { "category": "self", "summary": "SUSE Bug 1122944", "url": "https://bugzilla.suse.com/1122944" }, { "category": "self", "summary": "SUSE Bug 1122971", "url": "https://bugzilla.suse.com/1122971" }, { "category": "self", "summary": "SUSE Bug 1122982", "url": "https://bugzilla.suse.com/1122982" }, { "category": "self", "summary": "SUSE Bug 1123060", "url": "https://bugzilla.suse.com/1123060" }, { "category": "self", "summary": "SUSE Bug 1123061", "url": "https://bugzilla.suse.com/1123061" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1123317", "url": "https://bugzilla.suse.com/1123317" }, { "category": "self", "summary": "SUSE Bug 1123348", "url": "https://bugzilla.suse.com/1123348" }, { "category": "self", "summary": "SUSE Bug 1123357", "url": "https://bugzilla.suse.com/1123357" }, { "category": "self", "summary": "SUSE Bug 1123456", "url": "https://bugzilla.suse.com/1123456" }, { "category": "self", "summary": "SUSE Bug 1123538", "url": "https://bugzilla.suse.com/1123538" }, { "category": "self", "summary": "SUSE Bug 1123697", "url": "https://bugzilla.suse.com/1123697" }, { "category": "self", "summary": "SUSE Bug 1123882", "url": "https://bugzilla.suse.com/1123882" }, { "category": "self", "summary": "SUSE Bug 1123933", "url": "https://bugzilla.suse.com/1123933" }, { "category": "self", "summary": "SUSE Bug 1124055", "url": "https://bugzilla.suse.com/1124055" }, { "category": "self", "summary": "SUSE Bug 1124204", "url": "https://bugzilla.suse.com/1124204" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124579", "url": "https://bugzilla.suse.com/1124579" }, { "category": "self", "summary": "SUSE Bug 1124589", "url": "https://bugzilla.suse.com/1124589" }, { "category": "self", "summary": "SUSE Bug 1124728", "url": "https://bugzilla.suse.com/1124728" }, { "category": "self", "summary": "SUSE Bug 1124732", "url": "https://bugzilla.suse.com/1124732" }, { "category": "self", "summary": "SUSE Bug 1124735", "url": "https://bugzilla.suse.com/1124735" }, { "category": "self", "summary": "SUSE Bug 1124969", "url": "https://bugzilla.suse.com/1124969" }, { "category": "self", "summary": "SUSE Bug 1124974", "url": "https://bugzilla.suse.com/1124974" }, { "category": "self", "summary": "SUSE Bug 1124975", "url": "https://bugzilla.suse.com/1124975" }, { "category": "self", "summary": "SUSE Bug 1124976", "url": "https://bugzilla.suse.com/1124976" }, { "category": "self", "summary": "SUSE Bug 1124978", "url": "https://bugzilla.suse.com/1124978" }, { "category": "self", "summary": "SUSE Bug 1124979", "url": "https://bugzilla.suse.com/1124979" }, { "category": "self", "summary": "SUSE Bug 1124980", "url": "https://bugzilla.suse.com/1124980" }, { "category": "self", "summary": "SUSE Bug 1124981", "url": "https://bugzilla.suse.com/1124981" }, { "category": "self", "summary": "SUSE Bug 1124982", "url": "https://bugzilla.suse.com/1124982" }, { "category": "self", "summary": "SUSE Bug 1124984", "url": "https://bugzilla.suse.com/1124984" }, { "category": "self", "summary": "SUSE Bug 1124985", "url": "https://bugzilla.suse.com/1124985" }, { "category": "self", "summary": "SUSE Bug 1125109", "url": "https://bugzilla.suse.com/1125109" }, { "category": "self", "summary": "SUSE Bug 1125125", "url": "https://bugzilla.suse.com/1125125" }, { "category": "self", "summary": "SUSE Bug 1125252", "url": "https://bugzilla.suse.com/1125252" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125614", "url": "https://bugzilla.suse.com/1125614" }, { "category": "self", "summary": "SUSE Bug 1125728", "url": "https://bugzilla.suse.com/1125728" }, { "category": "self", "summary": "SUSE Bug 1125780", "url": "https://bugzilla.suse.com/1125780" }, { "category": "self", "summary": "SUSE Bug 1125797", "url": "https://bugzilla.suse.com/1125797" }, { "category": "self", "summary": "SUSE Bug 1125799", "url": "https://bugzilla.suse.com/1125799" }, { "category": "self", "summary": "SUSE Bug 1125800", "url": "https://bugzilla.suse.com/1125800" }, { "category": "self", "summary": "SUSE Bug 1125907", "url": "https://bugzilla.suse.com/1125907" }, { "category": "self", "summary": "SUSE Bug 1125947", "url": "https://bugzilla.suse.com/1125947" }, { "category": "self", "summary": "SUSE Bug 1126131", "url": "https://bugzilla.suse.com/1126131" }, { "category": "self", "summary": "SUSE Bug 1126209", "url": "https://bugzilla.suse.com/1126209" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126393", "url": "https://bugzilla.suse.com/1126393" }, { "category": "self", "summary": "SUSE Bug 1126476", "url": "https://bugzilla.suse.com/1126476" }, { "category": "self", "summary": "SUSE Bug 1126480", "url": "https://bugzilla.suse.com/1126480" }, { "category": "self", "summary": "SUSE Bug 1126481", "url": "https://bugzilla.suse.com/1126481" }, { "category": "self", "summary": "SUSE Bug 1126488", "url": "https://bugzilla.suse.com/1126488" }, { "category": "self", "summary": "SUSE Bug 1126495", "url": "https://bugzilla.suse.com/1126495" }, { "category": "self", "summary": "SUSE Bug 1126555", "url": "https://bugzilla.suse.com/1126555" }, { "category": "self", "summary": "SUSE Bug 1126579", "url": "https://bugzilla.suse.com/1126579" }, { "category": "self", "summary": "SUSE Bug 1126789", "url": "https://bugzilla.suse.com/1126789" }, { "category": "self", "summary": "SUSE Bug 1126790", "url": "https://bugzilla.suse.com/1126790" }, { "category": "self", "summary": "SUSE Bug 1126802", "url": "https://bugzilla.suse.com/1126802" }, { "category": "self", "summary": "SUSE Bug 1126803", "url": "https://bugzilla.suse.com/1126803" }, { "category": "self", "summary": "SUSE Bug 1126804", "url": "https://bugzilla.suse.com/1126804" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1126806", "url": "https://bugzilla.suse.com/1126806" }, { "category": "self", "summary": "SUSE Bug 1126807", "url": "https://bugzilla.suse.com/1126807" }, { "category": "self", "summary": "SUSE Bug 1127042", "url": "https://bugzilla.suse.com/1127042" }, { "category": "self", "summary": "SUSE Bug 1127062", "url": "https://bugzilla.suse.com/1127062" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127154", "url": "https://bugzilla.suse.com/1127154" }, { "category": "self", "summary": "SUSE Bug 1127285", "url": "https://bugzilla.suse.com/1127285" }, { "category": "self", "summary": "SUSE Bug 1127286", "url": "https://bugzilla.suse.com/1127286" }, { "category": "self", "summary": "SUSE Bug 1127307", "url": "https://bugzilla.suse.com/1127307" }, { "category": "self", "summary": "SUSE Bug 1127363", "url": "https://bugzilla.suse.com/1127363" }, { "category": "self", "summary": "SUSE Bug 1127493", "url": "https://bugzilla.suse.com/1127493" }, { "category": "self", "summary": "SUSE Bug 1127494", "url": "https://bugzilla.suse.com/1127494" }, { "category": "self", "summary": "SUSE Bug 1127495", "url": "https://bugzilla.suse.com/1127495" }, { "category": "self", "summary": "SUSE Bug 1127496", "url": "https://bugzilla.suse.com/1127496" }, { "category": "self", "summary": "SUSE Bug 1127497", "url": "https://bugzilla.suse.com/1127497" }, { "category": "self", "summary": "SUSE Bug 1127498", "url": "https://bugzilla.suse.com/1127498" }, { "category": "self", "summary": "SUSE Bug 1127534", "url": "https://bugzilla.suse.com/1127534" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127567", "url": "https://bugzilla.suse.com/1127567" }, { "category": "self", "summary": "SUSE Bug 1127578", "url": "https://bugzilla.suse.com/1127578" }, { "category": "self", "summary": "SUSE Bug 1127595", "url": "https://bugzilla.suse.com/1127595" }, { "category": "self", "summary": "SUSE Bug 1127603", "url": "https://bugzilla.suse.com/1127603" }, { "category": "self", "summary": "SUSE Bug 1127682", "url": "https://bugzilla.suse.com/1127682" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127750", "url": "https://bugzilla.suse.com/1127750" }, { "category": "self", "summary": "SUSE Bug 1127836", "url": "https://bugzilla.suse.com/1127836" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128094", "url": "https://bugzilla.suse.com/1128094" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128351", "url": "https://bugzilla.suse.com/1128351" }, { "category": "self", "summary": "SUSE Bug 1128451", "url": "https://bugzilla.suse.com/1128451" }, { "category": "self", "summary": "SUSE Bug 1128895", "url": "https://bugzilla.suse.com/1128895" }, { "category": "self", "summary": "SUSE Bug 1129046", "url": "https://bugzilla.suse.com/1129046" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129163", "url": "https://bugzilla.suse.com/1129163" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129181", "url": "https://bugzilla.suse.com/1129181" }, { "category": "self", "summary": "SUSE Bug 1129182", "url": "https://bugzilla.suse.com/1129182" }, { "category": "self", "summary": "SUSE Bug 1129183", "url": "https://bugzilla.suse.com/1129183" }, { "category": "self", "summary": "SUSE Bug 1129184", "url": "https://bugzilla.suse.com/1129184" }, { "category": "self", "summary": "SUSE Bug 1129205", "url": "https://bugzilla.suse.com/1129205" }, { "category": "self", "summary": "SUSE Bug 1129281", "url": "https://bugzilla.suse.com/1129281" }, { "category": "self", "summary": "SUSE Bug 1129284", "url": "https://bugzilla.suse.com/1129284" }, { "category": "self", "summary": "SUSE Bug 1129285", "url": "https://bugzilla.suse.com/1129285" }, { "category": "self", "summary": "SUSE Bug 1129291", "url": "https://bugzilla.suse.com/1129291" }, { "category": "self", "summary": "SUSE Bug 1129292", "url": "https://bugzilla.suse.com/1129292" }, { "category": "self", "summary": "SUSE Bug 1129293", "url": "https://bugzilla.suse.com/1129293" }, { "category": "self", "summary": "SUSE Bug 1129294", "url": "https://bugzilla.suse.com/1129294" }, { "category": "self", "summary": "SUSE Bug 1129295", "url": "https://bugzilla.suse.com/1129295" }, { "category": "self", "summary": "SUSE Bug 1129296", "url": "https://bugzilla.suse.com/1129296" }, { "category": "self", "summary": "SUSE Bug 1129326", "url": "https://bugzilla.suse.com/1129326" }, { "category": "self", "summary": "SUSE Bug 1129327", "url": "https://bugzilla.suse.com/1129327" }, { "category": "self", "summary": "SUSE Bug 1129330", "url": "https://bugzilla.suse.com/1129330" }, { "category": "self", "summary": "SUSE Bug 1129363", "url": "https://bugzilla.suse.com/1129363" }, { "category": "self", "summary": "SUSE Bug 1129366", "url": "https://bugzilla.suse.com/1129366" }, { "category": "self", "summary": "SUSE Bug 1129497", "url": "https://bugzilla.suse.com/1129497" }, { "category": "self", "summary": "SUSE Bug 1129519", "url": "https://bugzilla.suse.com/1129519" }, { "category": "self", "summary": "SUSE Bug 1129543", "url": "https://bugzilla.suse.com/1129543" }, { "category": "self", "summary": "SUSE Bug 1129547", "url": "https://bugzilla.suse.com/1129547" }, { "category": "self", "summary": "SUSE Bug 1129551", "url": "https://bugzilla.suse.com/1129551" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129625", "url": "https://bugzilla.suse.com/1129625" }, { "category": "self", "summary": "SUSE Bug 1129664", "url": "https://bugzilla.suse.com/1129664" }, { "category": "self", "summary": "SUSE Bug 1129739", "url": "https://bugzilla.suse.com/1129739" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 824948", "url": "https://bugzilla.suse.com/824948" }, { "category": "self", "summary": "SUSE CVE CVE-2018-20669 page", "url": "https://www.suse.com/security/cve/CVE-2018-20669/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3459 page", "url": "https://www.suse.com/security/cve/CVE-2019-3459/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3460 page", "url": "https://www.suse.com/security/cve/CVE-2019-3460/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-6974 page", "url": "https://www.suse.com/security/cve/CVE-2019-6974/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7221 page", "url": "https://www.suse.com/security/cve/CVE-2019-7221/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7222 page", "url": "https://www.suse.com/security/cve/CVE-2019-7222/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7308 page", "url": "https://www.suse.com/security/cve/CVE-2019-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8980 page", "url": "https://www.suse.com/security/cve/CVE-2019-8980/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-03-28T10:19:30Z", "generator": { "date": "2019-03-28T10:19:30Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2019:0785-1", "initial_release_date": "2019-03-28T10:19:30Z", "revision_history": [ { "date": "2019-03-28T10:19:30Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-azure-4.12.14-5.24.1.noarch", "product": { "name": "kernel-devel-azure-4.12.14-5.24.1.noarch", "product_id": "kernel-devel-azure-4.12.14-5.24.1.noarch" } }, { "category": "product_version", "name": "kernel-source-azure-4.12.14-5.24.1.noarch", "product": { "name": "kernel-source-azure-4.12.14-5.24.1.noarch", "product_id": "kernel-source-azure-4.12.14-5.24.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "cluster-md-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "cluster-md-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "cluster-md-kmp-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "dlm-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "dlm-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "dlm-kmp-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "gfs2-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "gfs2-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "gfs2-kmp-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-azure-4.12.14-5.24.1.x86_64", "product_id": "kernel-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-base-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-azure-base-4.12.14-5.24.1.x86_64", "product_id": "kernel-azure-base-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-devel-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-azure-devel-4.12.14-5.24.1.x86_64", "product_id": "kernel-azure-devel-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-extra-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-azure-extra-4.12.14-5.24.1.x86_64", "product_id": "kernel-azure-extra-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-azure-livepatch-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-azure-livepatch-4.12.14-5.24.1.x86_64", "product_id": "kernel-azure-livepatch-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-azure-4.12.14-5.24.1.x86_64", "product": { "name": "kernel-syms-azure-4.12.14-5.24.1.x86_64", "product_id": "kernel-syms-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "kselftests-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "kselftests-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "kselftests-kmp-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "ocfs2-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "ocfs2-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "ocfs2-kmp-azure-4.12.14-5.24.1.x86_64" } }, { "category": "product_version", "name": "reiserfs-kmp-azure-4.12.14-5.24.1.x86_64", "product": { "name": "reiserfs-kmp-azure-4.12.14-5.24.1.x86_64", "product_id": "reiserfs-kmp-azure-4.12.14-5.24.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product": { "name": "SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-public-cloud:15" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-4.12.14-5.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64" }, "product_reference": "kernel-azure-4.12.14-5.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-base-4.12.14-5.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64" }, "product_reference": "kernel-azure-base-4.12.14-5.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-azure-devel-4.12.14-5.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64" }, "product_reference": "kernel-azure-devel-4.12.14-5.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-azure-4.12.14-5.24.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch" }, "product_reference": "kernel-devel-azure-4.12.14-5.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-azure-4.12.14-5.24.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch" }, "product_reference": "kernel-source-azure-4.12.14-5.24.1.noarch", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-azure-4.12.14-5.24.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15", "product_id": "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" }, "product_reference": "kernel-syms-azure-4.12.14-5.24.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-20669", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2018-20669" } ], "notes": [ { "category": "general", "text": "An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2018-20669", "url": "https://www.suse.com/security/cve/CVE-2018-20669" }, { "category": "external", "summary": "SUSE Bug 1122971 for CVE-2018-20669", "url": "https://bugzilla.suse.com/1122971" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "important" } ], "title": "CVE-2018-20669" }, { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3459", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3459" } ], "notes": [ { "category": "general", "text": "A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3459", "url": "https://www.suse.com/security/cve/CVE-2019-3459" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3459", "url": "https://bugzilla.suse.com/1120758" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-3459" }, { "cve": "CVE-2019-3460", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3460" } ], "notes": [ { "category": "general", "text": "A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3460", "url": "https://www.suse.com/security/cve/CVE-2019-3460" }, { "category": "external", "summary": "SUSE Bug 1120758 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1120758" }, { "category": "external", "summary": "SUSE Bug 1155131 for CVE-2019-3460", "url": "https://bugzilla.suse.com/1155131" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.6, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-3460" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-3819" }, { "cve": "CVE-2019-6974", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-6974" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-6974", "url": "https://www.suse.com/security/cve/CVE-2019-6974" }, { "category": "external", "summary": "SUSE Bug 1124728 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124728" }, { "category": "external", "summary": "SUSE Bug 1124729 for CVE-2019-6974", "url": "https://bugzilla.suse.com/1124729" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "important" } ], "title": "CVE-2019-6974" }, { "cve": "CVE-2019-7221", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7221" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7221", "url": "https://www.suse.com/security/cve/CVE-2019-7221" }, { "category": "external", "summary": "SUSE Bug 1124732 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124732" }, { "category": "external", "summary": "SUSE Bug 1124734 for CVE-2019-7221", "url": "https://bugzilla.suse.com/1124734" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "important" } ], "title": "CVE-2019-7221" }, { "cve": "CVE-2019-7222", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7222" } ], "notes": [ { "category": "general", "text": "The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7222", "url": "https://www.suse.com/security/cve/CVE-2019-7222" }, { "category": "external", "summary": "SUSE Bug 1124735 for CVE-2019-7222", "url": "https://bugzilla.suse.com/1124735" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.8, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "low" } ], "title": "CVE-2019-7222" }, { "cve": "CVE-2019-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7308" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7308", "url": "https://www.suse.com/security/cve/CVE-2019-7308" }, { "category": "external", "summary": "SUSE Bug 1124055 for CVE-2019-7308", "url": "https://bugzilla.suse.com/1124055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "important" } ], "title": "CVE-2019-7308" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "important" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-8980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8980" } ], "notes": [ { "category": "general", "text": "A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8980", "url": "https://www.suse.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "SUSE Bug 1126209 for CVE-2019-8980", "url": "https://bugzilla.suse.com/1126209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "low" } ], "title": "CVE-2019-8980" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-base-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-azure-devel-4.12.14-5.24.1.x86_64", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-devel-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-source-azure-4.12.14-5.24.1.noarch", "SUSE Linux Enterprise Module for Public Cloud 15:kernel-syms-azure-4.12.14-5.24.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-03-28T10:19:30Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
fkie_cve-2019-7308
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
linux | linux_kernel | * | |
linux | linux_kernel | * | |
canonical | ubuntu_linux | 14.04 | |
canonical | ubuntu_linux | 16.04 | |
canonical | ubuntu_linux | 18.04 | |
canonical | ubuntu_linux | 18.10 | |
opensuse | leap | 15.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "628049F8-5F0F-499C-BDD3-30487768D043", "versionEndExcluding": "4.19.19", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "53904B23-3E55-4CEA-849C-3238A624E9D1", "versionEndExcluding": "4.20.6", "versionStartIncluding": "4.20.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks." }, { "lang": "es", "value": "En el kernel de Linux, en versiones anteriores a la 4.20.6, \"kernel/bpf/verifier.c\" realiza especulaciones fuera de l\u00edmites no deseables en la aritm\u00e9tica de punteros en varias ocasiones, incluyendo casos de diferentes ramas con distintos estados o l\u00edmites que hay que sanear, conduciendo a ataques de canal lateral." } ], "id": "CVE-2019-7308", "lastModified": "2024-11-21T04:47:58.557", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-02-01T22:29:00.283", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106827" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1711" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "source": "cve@mitre.org", "url": "https://support.f5.com/csp/article/K43030517" }, { "source": "cve@mitre.org", "url": "https://support.f5.com/csp/article/K43030517?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3930-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3930-2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3931-1/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3931-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106827" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K43030517" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.f5.com/csp/article/K43030517?utm_source=f5support\u0026amp%3Butm_medium=RSS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3930-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3930-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3931-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3931-2/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
opensuse-su-2019:1193-1
Vulnerability from csaf_opensuse
Notes
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for the Linux Kernel", "title": "Title of the patch" }, { "category": "description", "text": "\n\nThe openSUSE Leap 15.0 was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n- CVE-2019-3819: A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\u0027root\u0027) can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable (bnc#1123161).\n- CVE-2019-7308: kernel/bpf/verifier.c performed undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks (bnc#1124055).\n- CVE-2019-8912: af_alg_release() in crypto/af_alg.c neglected to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr (bnc#1125907).\n- CVE-2019-8980: A memory leak in the kernel_read_file function in fs/exec.c allowed attackers to cause a denial of service (memory consumption) by triggering vfs_read failures (bnc#1126209).\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n\nThe following non-security bugs were fixed:\n\n- 9p/net: fix memory leak in p9_client_create (bsc#1051510).\n- 9p: use inode-\u003ei_lock to protect i_size_write() under 32-bit (bsc#1051510).\n- acpi: acpi_pad: Do not launch acpi_pad threads on idle cpus (bsc#1113399).\n- acpi/APEI: Clear GHES block_status before panic() (bsc#1051510).\n- acpi/device_sysfs: Avoid OF modalias creation for removed device (bsc#1051510).\n- acpi/nfit: Fix bus command validation (bsc#1051510).\n- acpi: NUMA: Use correct type for printing addresses on i386-PAE (bsc#1051510).\n- acpi / video: Extend chassis-type detection with a \u0027Lunch Box\u0027 check (bsc#1051510).\n- acpi / video: Refactor and fix dmi_is_desktop() (bsc#1051510).\n- alsa: bebob: use more identical mod_alias for Saffire Pro 10 I/O against Liquid Saffire 56 (bsc#1051510).\n- alsa: compress: prevent potential divide by zero bugs (bsc#1051510).\n- alsa: echoaudio: add a check for ioremap_nocache (bsc#1051510).\n- alsa: firewire: add const qualifier to identifiers for read-only symbols (bsc#1051510).\n- alsa: firewire-motu: add a flag for AES/EBU on XLR interface (bsc#1051510).\n- alsa: firewire-motu: add specification flag for position of flag for MIDI messages (bsc#1051510).\n- alsa: firewire-motu: add support for MOTU Audio Express (bsc#1051510).\n- alsa: firewire-motu: add support for Motu Traveler (bsc#1051510).\n- alsa: firewire-motu: fix construction of PCM frame for capture direction (bsc#1051510).\n- alsa: firewire-motu: use \u0027version\u0027 field of unit directory to identify model (bsc#1051510).\n- alsa: hda - add Lenovo IdeaCentre B550 to the power_save_blacklist (bsc#1051510).\n- alsa: hda - Add quirk for HP EliteBook 840 G5 (bsc#1051510).\n- alsa: hda - Enforces runtime_resume after S3 and S4 for each codec (bsc#1051510).\n- alsa: hda/realtek - Add support for Acer Aspire E5-523G/ES1-432 headset mic (bsc#1051510).\n- alsa: hda/realtek: Disable PC beep in passthrough on alc285 (bsc#1051510).\n- alsa: hda/realtek: Enable ASUS X441MB and X705FD headset MIC with ALC256 (bsc#1051510).\n- alsa: hda/realtek: Enable audio jacks of ASUS UX362FA with ALC294 (bsc#1051510).\n- alsa: hda/realtek: Enable headset MIC of Acer AIO with ALC286 (bsc#1051510).\n- alsa: hda/realtek: Enable headset MIC of Acer Aspire Z24-890 with ALC286 (bsc#1051510).\n- alsa: hda/realtek: Enable headset mic of ASUS P5440FF with ALC256 (bsc#1051510).\n- alsa: hda/realtek - Headset microphone and internal speaker support for System76 oryp5 (bsc#1051510).\n- alsa: hda/realtek - Headset microphone support for System76 darp5 (bsc#1051510).\n- alsa: hda/realtek - Reduce click noise on Dell Precision 5820 headphone (bsc#1126131).\n- alsa: hda - Record the current power state before suspend/resume calls (bsc#1051510).\n- alsa: opl3: fix mismatch between snd_opl3_drum_switch definition and declaration (bsc#1051510).\n- alsa: pcm: Do not suspend stream in unrecoverable PCM state (bsc#1051510).\n- alsa: pcm: Fix possible OOB access in PCM oss plugins (bsc#1051510).\n- alsa: rawmidi: Fix potential Spectre v1 vulnerability (bsc#1051510).\n- alsa: sb8: add a check for request_region (bsc#1051510).\n- alsa: seq: oss: Fix Spectre v1 vulnerability (bsc#1051510).\n- alsa: usb-audio: Fix implicit fb endpoint setup by quirk (bsc#1051510).\n- altera-stapl: check for a null key before strcasecmp\u0027ing it (bsc#1051510).\n- apparmor: Fix aa_label_build() error handling for failed merges (bsc#1051510).\n- applicom: Fix potential Spectre v1 vulnerabilities (bsc#1051510).\n- aquantia: Setup max_mtu in ndev to enable jumbo frames (bsc#1051510).\n- arm64: fault: avoid send SIGBUS two times (bsc#1126393).\n- arm: 8808/1: kexec:offline panic_smp_self_stop CPU (bsc#1051510).\n- arm/arm64: KVM: Rename function kvm_arch_dev_ioctl_check_extension() (bsc#1126393).\n- arm: iop32x/n2100: fix PCI IRQ mapping (bsc#1051510).\n- arm: OMAP2+: hwmod: Fix some section annotations (bsc#1051510).\n- arm: pxa: avoid section mismatch warning (bsc#1051510).\n- arm: tango: Improve ARCH_MULTIPLATFORM compatibility (bsc#1051510).\n- ASoC: atom: fix a missing check of snd_pcm_lib_malloc_pages (bsc#1051510).\n- ASoC: dapm: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: fsl_esai: fix register setting issue in RIGHT_J mode (bsc#1051510).\n- ASoC: fsl: Fix SND_SOC_EUKREA_TLV320 build error on i.MX8M (bsc#1051510).\n- ASoC: imx-audmux: change snprintf to scnprintf for possible overflow (bsc#1051510).\n- ASoC: imx-sgtl5000: put of nodes if finding codec fails (bsc#1051510).\n- ASoC: Intel: Haswell/Broadwell: fix setting for .dynamic field (bsc#1051510).\n- ASoC: msm8916-wcd-analog: add missing license information (bsc#1051510).\n- ASoC: qcom: Fix of-node refcount unbalance in apq8016_sbc_parse_of() (bsc#1051510).\n- ASoC: rsnd: fixup rsnd_ssi_master_clk_start() user count check (bsc#1051510).\n- assoc_array: Fix shortcut creation (bsc#1051510).\n- ata: ahci: mvebu: remove stale comment (bsc#1051510).\n- ath9k: Avoid OF no-EEPROM quirks without qca,no-eeprom (bsc#1051510).\n- ath9k: dynack: check da-\u003eenabled first in sampling routines (bsc#1051510).\n- ath9k: dynack: make ewma estimation faster (bsc#1051510).\n- ath9k: dynack: use authentication messages for \u0027late\u0027 ack (bsc#1051510).\n- atm: he: fix sign-extension overflow on large shift (bsc#1051510).\n- auxdisplay: hd44780: Fix memory leak on -\u003eremove() (bsc#1051510).\n- auxdisplay: ht16k33: fix potential user-after-free on module unload (bsc#1051510).\n- ax25: fix possible use-after-free (bsc#1051510).\n- backlight: pwm_bl: Use gpiod_get_value_cansleep() to get initial (bsc#1113722)\n- batman-adv: Avoid WARN on net_device without parent in netns (bsc#1051510).\n- batman-adv: fix uninit-value in batadv_interface_tx() (bsc#1051510).\n- batman-adv: Force mac header to start of data on xmit (bsc#1051510).\n- bio: Introduce BIO_ALLOCED flag and check it in bio_free (bsc#1128094).\n- blk-mq: fix a hung issue when fsync (bsc#1125252).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1128094).\n- blockdev: Fix livelocks on loop device (bsc#1124984).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128895).\n- block: do not warn when doing fsync on read-only devices (bsc#1125252).\n- block/loop: Use global lock for ioctl() operation (bsc#1124974).\n- block: move bio_integrity_{intervals,bytes} into blkdev.h (bsc#1114585).\n- bluetooth: Fix decrementing reference count twice in releasing socket (bsc#1051510).\n- bluetooth: Fix locking in bt_accept_enqueue() for BH context (bsc#1051510).\n- bluetooth: Fix unnecessary error message for HCI request completion (bsc#1051510).\n- bluetooth: hci_ldisc: Initialize hci_dev before open() (bsc#1051510).\n- bluetooth: hci_ldisc: Postpone HCI_UART_PROTO_READY bit set in hci_uart_set_proto() (bsc#1051510).\n- bnxt_en: Fix typo in firmware message timeout logic (bsc#1086282 ).\n- bnxt_en: Wait longer for the firmware message response to complete (bsc#1086282).\n- bpf: decrease usercnt if bpf_map_new_fd() fails in bpf_map_get_fd_by_id() (bsc#1083647).\n- bpf: drop refcount if bpf_map_new_fd() fails in map_create() (bsc#1083647).\n- bpf: fix lockdep false positive in percpu_freelist (bsc#1083647).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1083647).\n- bpf: fix sanitation rewrite in case of non-pointers (bsc#1083647).\n- bpf: Fix syscall\u0027s stackmap lookup potential deadlock (bsc#1083647).\n- bpf, lpm: fix lookup bug in map_delete_elem (bsc#1083647).\n- bpf/verifier: fix verifier instability (bsc#1056787).\n- bsg: Do not copy sense if no response buffer is allocated (bsc#1106811,bsc#1126555).\n- btrfs: dedupe_file_range ioctl: remove 16MiB restriction (bsc#1127494).\n- btrfs: do not unnecessarily pass write_lock_level when processing leaf (bsc#1126802).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128451).\n- btrfs: fix clone vs chattr NODATASUM race (bsc#1127497).\n- btrfs: fix corruption reading shared and compressed extents after hole punching (bsc#1126476).\n- btrfs: fix deadlock between clone/dedupe and rename (bsc#1130518).\n- btrfs: fix deadlock when allocating tree block during leaf/node split (bsc#1126806).\n- btrfs: fix deadlock when using free space tree due to block group creation (bsc#1126804).\n- btrfs: fix fsync after succession of renames and unlink/rmdir (bsc#1126488).\n- btrfs: fix fsync after succession of renames of different files (bsc#1126481).\n- btrfs: fix invalid-free in btrfs_extent_same (bsc#1127498).\n- btrfs: fix reading stale metadata blocks after degraded raid1 mounts (bsc#1126803).\n- btrfs: fix use-after-free of cmp workspace pages (bsc#1127603).\n- btrfs: grab write lock directly if write_lock_level is the max level (bsc#1126802).\n- btrfs: Improve btrfs_search_slot description (bsc#1126802).\n- btrfs: move get root out of btrfs_search_slot to a helper (bsc#1126802).\n- btrfs: qgroup: Cleanup old subtree swap code (bsc#1063638).\n- btrfs: qgroup: Do not trace subtree if we\u0027re dropping reloc tree (bsc#1063638).\n- btrfs: qgroup: Finish rescan when hit the last leaf of extent tree (bsc#1129327).\n- btrfs: qgroup: Introduce function to find all new tree blocks of reloc tree (bsc#1063638).\n- btrfs: qgroup: Introduce function to trace two swaped extents (bsc#1063638).\n- btrfs: qgroup: Introduce per-root swapped blocks infrastructure (bsc#1063638).\n- btrfs: qgroup: Introduce trace event to analyse the number of dirty extents accounted (bsc#1063638 dependency).\n- btrfs: qgroup: Make qgroup async transaction commit more aggressive (bsc#1113042).\n- btrfs: qgroup: Only trace data extents in leaves if we\u0027re relocating data block group (bsc#1063638).\n- btrfs: qgroup: Refactor btrfs_qgroup_trace_subtree_swap (bsc#1063638).\n- btrfs: qgroup: Search commit root for rescan to avoid missing extent (bsc#1129326).\n- btrfs: qgroup: Use delayed subtree rescan for balance (bsc#1063638).\n- btrfs: qgroup: Use generation-aware subtree swap to mark dirty extents (bsc#1063638).\n- btrfs: quota: Set rescan progress to (u64)-1 if we hit last leaf (bsc#1129327).\n- btrfs: relocation: Delay reloc tree deletion after merge_reloc_roots (bsc#1063638).\n- btrfs: reloc: Fix NULL pointer dereference due to expanded reloc_root lifespan (bsc#1129497).\n- btrfs: remove always true check in unlock_up (bsc#1126802).\n- btrfs: remove superfluous free_extent_buffer in read_block_for_search (bsc#1126802).\n- btrfs: remove unnecessary level check in balance_level (bsc#1126802).\n- btrfs: remove unused check of skip_locking (bsc#1126802).\n- btrfs: reuse cmp workspace in EXTENT_SAME ioctl (bsc#1127495).\n- btrfs: send, fix race with transaction commits that create snapshots (bsc#1126802).\n- btrfs: simplify IS_ERR/PTR_ERR checks (bsc#1126481).\n- btrfs: split btrfs_extent_same (bsc#1127493).\n- btrfs: use kvzalloc for EXTENT_SAME temporary data (bsc#1127496).\n- btrfs: use more straightforward extent_buffer_uptodate check (bsc#1126802).\n- cdc-wdm: pass return value of recover_from_urb_loss (bsc#1051510).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126790).\n- ceph: clear inode pointer when snap realm gets dropped by its inode (bsc#1125799).\n- cfg80211: extend range deviation for DMG (bsc#1051510).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- cifs: allow guest mounts to work for smb3.11 (bsc#1051510).\n- cifs: Always resolve hostname before reconnecting (bsc#1051510).\n- cifs: connect to servername instead of IP for IPC$ share (bsc#1051510).\n- cifs: Fix NULL pointer dereference of devname (bnc#1129519).\n- cifs: invalidate cache when we truncate a file (bsc#1051510).\n- cifs: OFD locks do not conflict with eachothers (bsc#1051510).\n- clk: armada-370: fix refcount leak in a370_clk_init() (bsc#1051510).\n- clk: armada-xp: fix refcount leak in axp_clk_init() (bsc#1051510).\n- clk: clk-twl6040: Fix imprecise external abort for pdmclk (bsc#1051510).\n- clk: dove: fix refcount leak in dove_clk_init() (bsc#1051510).\n- clk: highbank: fix refcount leak in hb_clk_init() (bsc#1051510).\n- clk: imx6q: fix refcount leak in imx6q_clocks_init() (bsc#1051510).\n- clk: imx6sl: ensure MMDC CH0 handshake is bypassed (bsc#1051510).\n- clk: imx6sx: fix refcount leak in imx6sx_clocks_init() (bsc#1051510).\n- clk: imx7d: fix refcount leak in imx7d_clocks_init() (bsc#1051510).\n- clk: ingenic: Fix doc of ingenic_cgu_div_info (bsc#1051510).\n- clk: ingenic: Fix round_rate misbehaving with non-integer dividers (bsc#1051510).\n- clk: kirkwood: fix refcount leak in kirkwood_clk_init() (bsc#1051510).\n- clk: mv98dx3236: fix refcount leak in mv98dx3236_clk_init() (bsc#1051510).\n- clk: qoriq: fix refcount leak in clockgen_init() (bsc#1051510).\n- clk: samsung: exynos4: fix refcount leak in exynos4_get_xom() (bsc#1051510).\n- clk: socfpga: fix refcount leak (bsc#1051510).\n- clk: sunxi: A31: Fix wrong AHB gate number (bsc#1051510).\n- clk: sunxi-ng: a33: Set CLK_SET_RATE_PARENT for all audio module clocks (bsc#1051510).\n- clk: sunxi-ng: sun8i-a23: Enable PLL-MIPI LDOs when ungating it (bsc#1051510).\n- clk: sunxi-ng: v3s: Fix TCON reset de-assert bit (bsc#1051510).\n- clk: uniphier: Fix update register for CPU-gear (bsc#1051510).\n- clk: vc5: Abort clock configuration without upstream clock (bsc#1051510).\n- clk: vf610: fix refcount leak in vf610_clocks_init() (bsc#1051510).\n- clocksource/drivers/exynos_mct: Clear timer interrupt when shutdown (bsc#1051510).\n- clocksource/drivers/exynos_mct: Fix error path in timer resources initialization (bsc#1051510).\n- clocksource/drivers/exynos_mct: Move one-shot check from tick clear to ISR (bsc#1051510).\n- clocksource/drivers/integrator-ap: Add missing of_node_put() (bsc#1051510).\n- clocksource/drivers/sun5i: Fail gracefully when clock rate is unavailable (bsc#1051510).\n- configfs: fix registered group removal (bsc#1051510).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- cpcap-charger: generate events for userspace (bsc#1051510).\n- cpufreq: Cap the default transition delay value to 10 ms (bsc#1127042).\n- cpufreq: conservative: Take limits changes into account properly (bsc#1051510).\n- cpufreq: governor: Avoid accessing invalid governor_data (bsc#1051510).\n- cpufreq: governor: Drop min_sampling_rate (bsc#1127042).\n- cpufreq: governor: Ensure sufficiently large sampling intervals (bsc#1127042).\n- cpufreq: pxa2xx: remove incorrect __init annotation (bsc#1051510).\n- cpufreq: tegra124: add missing of_node_put() (bsc#1051510).\n- cpufreq: Use transition_delay_us for legacy governors as well (bsc#1127042).\n- cpuidle: big.LITTLE: fix refcount leak (bsc#1051510).\n- crypto: aes_ti - disable interrupts while accessing S-box (bsc#1051510).\n- crypto: ahash - fix another early termination in hash walk (bsc#1051510).\n- crypto: arm64/aes-ccm - fix logical bug in AAD MAC handling (bsc#1051510).\n- crypto: arm/crct10dif - revert to C code for short inputs (bsc#1051510).\n- crypto: brcm - Fix some set-but-not-used warning (bsc#1051510).\n- crypto: caam - fixed handling of sg list (bsc#1051510).\n- crypto: cavium/zip - fix collision with generic cra_driver_name (bsc#1051510).\n- crypto: crypto4xx - add missing of_node_put after of_device_is_available (bsc#1051510).\n- crypto: crypto4xx - Fix wrong ppc4xx_trng_probe()/ppc4xx_trng_remove() arguments (bsc#1051510).\n- crypto: hash - set CRYPTO_TFM_NEED_KEY if -\u003esetkey() fails (bsc#1051510).\n- crypto: testmgr - skip crc32c context test for ahash algorithms (bsc#1051510).\n- crypto: tgr192 - fix unaligned memory access (bsc#1051510).\n- crypto: ux500 - Use proper enum in cryp_set_dma_transfer (bsc#1051510).\n- crypto: ux500 - Use proper enum in hash_set_dma_transfer (bsc#1051510).\n- cw1200: drop useless LIST_HEAD (bsc#1051510).\n- cw1200: Fix concurrency use-after-free bugs in cw1200_hw_scan() (bsc#1051510).\n- cw1200: fix missing unlock on error in cw1200_hw_scan() (bsc#1051510).\n- dccp: fool proof ccid_hc_[rt]x_parse_options() (bsc#1051510).\n- debugfs: fix debugfs_rename parameter checking (bsc#1051510).\n- device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1051510).\n- dlm: Do not swamp the CPU with callbacks queued during recovery (bsc#1051510).\n- dmaengine: at_hdmac: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: at_xdmac: Fix wrongfull report of a channel as in use (bsc#1051510).\n- dmaengine: bcm2835: Fix abort of transactions (bsc#1051510).\n- dmaengine: bcm2835: Fix interrupt race on RT (bsc#1051510).\n- dmaengine: dmatest: Abort test in case of mapping error (bsc#1051510).\n- dmaengine: dw: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: imx-dma: fix wrong callback invoke (bsc#1051510).\n- dmaengine: mv_xor: Use correct device for DMA API (bsc#1051510).\n- dmaengine: pl330: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: sa11x0: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: st_fdma: drop useless LIST_HEAD (bsc#1051510).\n- dmaengine: stm32-dma: fix incomplete configuration in cyclic mode (bsc#1051510).\n- dma: Introduce dma_max_mapping_size() (bsc#1120008).\n- doc: rcu: Suspicious RCU usage is a warning (bsc#1051510).\n- Do not log confusing message on reconnect by default (bsc#1129664).\n- driver core: Do not resume suppliers under device_links_write_lock() (bsc#1051510).\n- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: preserve hv_ringbuffer_get_debuginfo kABI (bsc#1126389, bsc#1126579).\n- drivers: hv: vmbus: Return -EINVAL for the sys files for unopened channels (bsc#1126389, bsc#1126579).\n- drm/amdgpu: Add delay after enable RLC ucode (bsc#1051510).\n- drm/ast: Fix connector leak during driver unload (bsc#1051510).\n- drm/ast: fixed reading monitor EDID not stable issue (bsc#1051510).\n- drm/atomic-helper: Complete fake_commit-\u003eflip_done potentially earlier (bsc#1051510).\n- drm: Block fb changes for async plane updates (bsc#1051510).\n- drm/bridge: tc358767: add defines for DP1_SRCCTRL \u0026 PHY_2LANE (bsc#1051510).\n- drm/bridge: tc358767: fix initial DP0/1_SRCCTRL value (bsc#1051510).\n- drm/bridge: tc358767: fix output H/V syncs (bsc#1051510).\n- drm/bridge: tc358767: fix single lane configuration (bsc#1051510).\n- drm/bridge: tc358767: reject modes which require too much BW (bsc#1051510).\n- drm/bufs: Fix Spectre v1 vulnerability (bsc#1051510).\n- drm: Clear state-\u003eacquire_ctx before leaving drm_atomic_helper_commit_duplicated_state() (bsc#1051510).\n- drm: disable uncached DMA optimization for ARM and arm64 (bsc#1051510).\n- drm/etnaviv: NULL vs IS_ERR() buf in etnaviv_core_dump() (bsc#1113722)\n- drm/etnaviv: potential NULL dereference (bsc#1113722)\n- drm: Fix error handling in drm_legacy_addctx (bsc#1113722)\n- drm/i915/bios: assume eDP is present on port A when there is no VBT (bsc#1051510).\n- drm/i915: Block fbdev HPD processing during suspend (bsc#1113722)\n- drm/i915/fbdev: Actually configure untiled displays (bsc#1113722)\n- drm/i915: Flush GPU relocs harder for gen3 (bsc#1113722)\n- drm/i915/gvt: free VFIO region space in vgpu detach (bsc#1113722)\n- drm/i915/gvt: release shadow batch buffer and wa_ctx before destroy one workload (bsc#1051510).\n- drm/i915/opregion: fix version check (bsc#1113722)\n- drm/i915/opregion: rvda is relative from opregion base in opregion (bsc#1113722)\n- drm/i915: Prevent a race during I915_GEM_MMAP ioctl with WC set (bsc#1113722)\n- drm/i915: Redefine some Whiskey Lake SKUs (bsc#1051510).\n- drm/i915: Relax mmap VMA check (bsc#1051510).\n- drm/i915: Use the correct crtc when sanitizing plane mapping (bsc#1113722)\n- drm/imx: ignore plane updates on disabled crtcs (bsc#1051510).\n- drm/imx: imx-ldb: add missing of_node_puts (bsc#1051510).\n- drm/meson: add missing of_node_put (bsc#1051510).\n- drm/modes: Prevent division by zero htotal (bsc#1051510).\n- drm/msm: Fix error return checking (bsc#1051510).\n- drm/msm: Grab a vblank reference when waiting for commit_done (bsc#1051510).\n- drm/msm: Unblock writer if reader closes file (bsc#1051510).\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1113722)\n- drm/nouveau/debugfs: Fix check of pm_runtime_get_sync failure (bsc#1051510).\n- drm/nouveau: Do not spew kernel WARNING for each timeout (bsc#1126480).\n- drm/nouveau: Do not WARN_ON VCPI allocation failures (bsc#1113722)\n- drm/nouveau/falcon: avoid touching registers if engine is off (bsc#1051510).\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1113722)\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1113722)\n- drm: Reorder set_property_atomic to avoid returning with an active ww_ctx (bsc#1051510).\n- drm/rockchip: fix for mailbox read size (bsc#1051510).\n- drm/shmob: Fix return value check in shmob_drm_probe (bsc#1113722)\n- drm/sun4i: tcon: Prepare and enable TCON channel 0 clock at init (bsc#1051510).\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- earlycon: Initialize port-\u003euartclk based on clock-frequency property (bsc#1051510).\n- earlycon: Remove hardcoded port-\u003euartclk initialization in of_setup_earlycon (bsc#1051510).\n- Enable CONFIG_RDMA_RXE=m also for ppc64le (bsc#1107665,)\n- Enable livepatch test drivers in lib/ Livepatch kselftests need those.\n- enic: fix build warning without CONFIG_CPUMASK_OFFSTACK (bsc#1051510).\n- enic: fix checksum validation for IPv6 (bsc#1051510).\n- esp6: fix memleak on error path in esp6_input (bsc#1051510).\n- esp: Fix locking on page fragment allocation (bsc#1051510).\n- esp: Fix memleaks on error paths (bsc#1051510).\n- esp: Fix skb tailroom calculation (bsc#1051510).\n- ext4: avoid kernel warning when writing the superblock to a dead device (bsc#1124981).\n- ext4: Avoid panic during forced reboot (bsc#1126356).\n- ext4: check for shutdown and r/o file system in ext4_write_inode() (bsc#1124978).\n- ext4: fix a potential fiemap/page fault deadlock w/ inline_data (bsc#1124980).\n- ext4: force inode writes when nfsd calls commit_metadata() (bsc#1125125).\n- ext4: include terminating u32 in size of xattr entries when expanding inodes (bsc#1124976).\n- ext4: make sure enough credits are reserved for dioread_nolock writes (bsc#1124979).\n- ext4: track writeback errors using the generic tracking infrastructure (bsc#1124982).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1113722)\n- firmware/efi: Add NULL pointer checks in efivars API functions (bsc#1051510).\n- floppy: check_events callback should not return a negative number (bsc#1051510).\n- fs/dax: deposit pagetable even when installing zero page (bsc#1126740).\n- fs/dcache: Fix incorrect nr_dentry_unused accounting in shrink_dcache_sb() (git-fixes).\n- fs/devpts: always delete dcache dentry-s in dput() (git-fixes).\n- fuse: call pipe_buf_release() under pipe lock (bsc#1051510).\n- fuse: continue to send FUSE_RELEASEDIR when FUSE_OPEN returns ENOSYS (bsc#1051510).\n- fuse: decrement NR_WRITEBACK_TEMP on the right page (bsc#1051510).\n- fuse: handle zero sized retrieve correctly (bsc#1051510).\n- futex: Fix (possible) missed wakeup (bsc#1050549).\n- gdrom: fix a memory leak bug (bsc#1051510).\n- geneve: cleanup hard coded value for Ethernet header length (bsc#1123456).\n- geneve: correctly handle ipv6.disable module parameter (bsc#1051510).\n- geneve, vxlan: Do not check skb_dst() twice (bsc#1123456).\n- geneve, vxlan: Do not set exceptions if skb-\u003elen \u0026lt; mtu (bsc#1123456).\n- genwqe: Fix size check (bsc#1051510).\n- gfs2: Revert \u0027Fix loop in gfs2_rbm_find\u0027 (bsc#1120601).\n- gianfar: fix a flooded alignment reports because of padding issue (bsc#1051510).\n- gianfar: Fix Rx byte accounting for ndev stats (bsc#1051510).\n- gianfar: prevent integer wrapping in the rx handler (bsc#1051510).\n- gpu: ipu-v3: Fix CSI offsets for imx53 (bsc#1113722)\n- gpu: ipu-v3: Fix i.MX51 CSI control registers offset (bsc#1113722)\n- gpu: ipu-v3: image-convert: Prevent race between run and unprepare (bsc#1051510).\n- gro_cells: make sure device is up in gro_cells_receive() (git-fixes).\n- hid: lenovo: Add checks to fix of_led_classdev_register (bsc#1051510).\n- hpet: Fix missing \u0027=\u0027 character in the __setup() code of hpet_mmap_enable (git-fixes).\n- hvc_opal: do not set tb_ticks_per_usec in udbg_init_opal_common() (bsc#1051510).\n- hv: reduce storvsc_ringbuffer_size from 1M to 128K to simplify booting with 1k vcpus ().\n- hv: v4.12 API for hyperv-iommu (bsc#1122822).\n- hwmon: (lm80) fix a missing check of bus read in lm80 probe (bsc#1051510).\n- hwmon: (lm80) fix a missing check of the status of SMBus read (bsc#1051510).\n- hwmon: (lm80) Fix missing unlock on error in set_fan_div() (bsc#1051510).\n- hwmon: (tmp421) Correct the misspelling of the tmp442 compatible attribute in OF device ID table (bsc#1051510).\n- HYPERV/IOMMU: Add Hyper-V stub IOMMU driver (bsc#1122822).\n- i2c-axxia: check for error conditions first (bsc#1051510).\n- i2c: bcm2835: Clear current buffer pointers and counts after a transfer (bsc#1051510).\n- i2c: cadence: Fix the hold bit setting (bsc#1051510).\n- i2c: omap: Use noirq system sleep pm ops to idle device for suspend (bsc#1051510).\n- i2c: sh_mobile: add support for r8a77990 (R-Car E3) (bsc#1051510).\n- i2c: tegra: fix maximum transfer size (bsc#1051510).\n- ib/core: Destroy QP if XRC QP fails (bsc#1046306).\n- ib/core: Fix potential memory leak while creating MAD agents (bsc#1046306).\n- ib/core: Unregister notifier before freeing MAD security (bsc#1046306).\n- ib/hfi1: Close race condition on user context disable and close (bsc#1060463).\n- ib/mlx5: Unmap DMA addr from HCA before IOMMU (bsc#1046305 ).\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- ieee802154: ca8210: fix possible u8 overflow in ca8210_rx_done (bsc#1051510).\n- igb: Fix an issue that PME is not enabled during runtime suspend (bsc#1051510).\n- iio: accel: kxcjk1013: Add KIOX010A ACPI Hardware-ID (bsc#1051510).\n- iio: adc: exynos-adc: Fix NULL pointer exception on unbind (bsc#1051510).\n- iio: chemical: atlas-ph-sensor: correct IIO_TEMP values to millicelsius (bsc#1051510).\n- Input: bma150 - register input device after setting private data (bsc#1051510).\n- input: cap11xx - switch to using set_brightness_blocking() (bsc#1051510).\n- Input: elan_i2c - add ACPI ID for touchpad in Lenovo V330-15ISK (bsc#1051510).\n- Input: elan_i2c - add id for touchpad found in Lenovo s21e-20 (bsc#1051510).\n- Input: elantech - enable 3rd button support on Fujitsu CELSIUS H780 (bsc#1051510).\n- input: matrix_keypad - use flush_delayed_work() (bsc#1051510).\n- Input: raspberrypi-ts - select CONFIG_INPUT_POLLDEV (git-fixes).\n- input: st-keyscan - fix potential zalloc NULL dereference (bsc#1051510).\n- input: uinput - fix undefined behavior in uinput_validate_absinfo() (bsc#1120902).\n- Input: wacom_serial4 - add support for Wacom ArtPad II tablet (bsc#1051510).\n- intel_th: Do not reference unassigned outputs (bsc#1051510).\n- intel_th: gth: Fix an off-by-one in output unassigning (bsc#1051510).\n- iomap: fix integer truncation issues in the zeroing and dirtying helpers (bsc#1125947).\n- iomap: warn on zero-length mappings (bsc#1127062).\n- iommu/amd: Fix NULL dereference bug in match_hid_uid (bsc#1130336).\n- iommu/amd: fix sg-\u003edma_address for sg-\u003eoffset bigger than PAGE_SIZE (bsc#1130337).\n- iommu/amd: Reserve exclusion range in iova-domain (bsc#1130425).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129181).\n- iommu: Document iommu_ops.is_attach_deferred() (bsc#1129182).\n- iommu: Do not print warning when IOMMU driver only supports unmanaged domains (bsc#1130130).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129205).\n- iommu/vt-d: Check capability before disabling protected memory (bsc#1130338).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129183).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129184).\n- ip6: fix PMTU discovery when using /127 subnets (git-fixes).\n- ip6mr: Do not call __IP6_INC_STATS() from preemptible context (git-fixes).\n- ip6_tunnel: get the min mtu properly in ip6_tnl_xmit (bsc#1123456).\n- ip6_tunnel: use the right value for ipv4 min mtu check in ip6_tnl_xmit (bsc#1123456).\n- ipsec: check return value of skb_to_sgvec always (bsc#1051510).\n- ipv4/route: fail early when inet dev is missing (git-fixes).\n- ipv4: speedup ipv6 tunnels dismantle (bsc#1122982).\n- ipv6: addrlabel: per netns list (bsc#1122982).\n- ipv6: Consider sk_bound_dev_if when binding a socket to an address (networking-stable-19_02_01).\n- ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped address (networking-stable-19_01_22).\n- ipv6: fix kernel-infoleak in ipv6_local_error() (networking-stable-19_01_20).\n- ipv6: speedup ipv6 tunnels dismantle (bsc#1122982). Refresh patches.suse/ip6_vti-fix-a-null-pointer-deference-when-destroy-vt.patch\n- ipv6: Take rcu_read_lock in __inet6_bind for mapped addresses (networking-stable-19_01_22).\n- ipvlan, l3mdev: fix broken l3s mode wrt local routes (networking-stable-19_02_01).\n- irqchip/gic-v3-its: Align PCI Multi-MSI allocation on their size (bsc#1051510).\n- irqchip/gic-v3-its: Avoid parsing _indirect_ twice for Device table (bsc#1051510).\n- irqchip/gic-v3-its: Do not bind LPI to unavailable NUMA node (bsc#1051510).\n- irqchip/gic-v3-its: Fix ITT_entry_size accessor (bsc#1051510).\n- irqchip/mmp: Only touch the PJ4 IRQ \u0026 FIQ bits on enable/disable (bsc#1051510).\n- iscsi_ibft: Fix missing break in switch statement (bsc#1051510).\n- isdn: avm: Fix string plus integer warning from Clang (bsc#1051510).\n- isdn: hisax: hfc_pci: Fix a possible concurrency use-after-free bug in HFCPCI_l1hw() (bsc#1051510).\n- isdn: i4l: isdn_tty: Fix some concurrency double-free bugs (bsc#1051510).\n- iser: set sector for ambiguous mr status errors (bsc#1051510).\n- iwlwifi: mvm: avoid possible access out of array (bsc#1051510).\n- iwlwifi: mvm: fix A-MPDU reference assignment (bsc#1051510).\n- iwlwifi: mvm: fix firmware statistics usage (bsc#1129770).\n- iwlwifi: mvm: fix RSS config command (bsc#1051510).\n- iwlwifi: pcie: fix emergency path (bsc#1051510).\n- iwlwifi: pcie: fix TX while flushing (bsc#1120902).\n- ixgbe: Be more careful when modifying MAC filters (bsc#1051510).\n- ixgbe: check return value of napi_complete_done() (bsc#1051510).\n- ixgbe: recognize 1000BaseLX SFP modules as 1Gbps (bsc#1051510).\n- kabi: cpufreq: keep min_sampling_rate in struct dbs_data (bsc#1127042).\n- kabi: handle addition of ip6addrlbl_table into struct netns_ipv6 (bsc#1122982).\n- kabi: handle addition of uevent_sock into struct net (bsc#1122982).\n- kabi: Preserve kABI for dma_max_mapping_size() (bsc#1120008).\n- kabi: protect vhost_log_write (kabi).\n- kabi: restore ip_tunnel_delete_net() (bsc#1122982).\n- kabi workaround for ath9k ath_node.ackto type change (bsc#1051510).\n- kABI workaround for bt_accept_enqueue() change (bsc#1051510).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- kasan: fix shadow_size calculation error in kasan_module_alloc (bsc#1051510).\n- kbuild: fix false positive warning/error about missing libelf (bsc#1051510).\n- kconfig: fix file name and line number of warn_ignored_character() (bsc#1051510).\n- kconfig: fix line numbers for if-entries in menu tree (bsc#1051510).\n- kconfig: fix memory leak when EOF is encountered in quotation (bsc#1051510).\n- kconfig: fix the rule of mainmenu_stmt symbol (bsc#1051510).\n- keys: allow reaching the keys quotas exactly (bsc#1051510).\n- keys: Timestamp new keys (bsc#1051510).\n- kgdboc: fix KASAN global-out-of-bounds bug in param_set_kgdboc_var() (bsc#1051510).\n- kgdboc: Fix restrict error (bsc#1051510).\n- kgdboc: Fix warning with module build (bsc#1051510).\n- kobject: add kobject_uevent_net_broadcast() (bsc#1122982).\n- kobject: copy env blob in one go (bsc#1122982).\n- kobject: factorize skb setup in kobject_uevent_net_broadcast() (bsc#1122982).\n- kprobes: Return error if we fail to reuse kprobe instead of BUG_ON() (bsc#1051510).\n- kvm: mmu: Fix race in emulated page table writes (bsc#1129284).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129291).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129292).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129293).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129294).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: Fix single-step debugging (bsc#1129295).\n- kvm: x86: Use jmp to invoke kvm_spurious_fault() from .fixup (bsc#1129296).\n- l2tp: copy 4 more bytes to linear part if necessary (networking-stable-19_02_01).\n- l2tp: fix infoleak in l2tp_ip6_recvmsg() (git-fixes).\n- l2tp: fix reading optional fields of L2TPv3 (networking-stable-19_02_01).\n- leds: lp5523: fix a missing check of return value of lp55xx_read (bsc#1051510).\n- leds: lp55xx: fix null deref on firmware load failure (bsc#1051510).\n- libceph: avoid KEEPALIVE_PENDING races in ceph_con_keepalive() (bsc#1125800).\n- libceph: handle an empty authorize reply (bsc#1126789).\n- libceph: wait for latest osdmap in ceph_monc_blacklist_add() (bsc#1130427).\n- lib/div64.c: off by one in shift (bsc#1051510).\n- libertas_tf: do not set URB_ZERO_PACKET on IN USB transfer (bsc#1051510).\n- libnvdimm: Fix altmap reservation size calculation (bsc#1127682).\n- libnvdimm/label: Clear \u0027updating\u0027 flag after label-set update (bsc#1129543).\n- libnvdimm/pmem: Honor force_raw for legacy pmem regions (bsc#1129551).\n- lightnvm: fail fast on passthrough commands (bsc#1125780).\n- livepatch: Change unsigned long old_addr -\u003e void *old_func in struct klp_func (bsc#1071995).\n- livepatch: Consolidate klp_free functions (bsc#1071995 ).\n- livepatch: core: Return EOPNOTSUPP instead of ENOSYS (bsc#1071995).\n- livepatch: Define a macro for new API identification (bsc#1071995).\n- livepatch: Do not block the removal of patches loaded after a forced transition (bsc#1071995).\n- livepatch: Introduce klp_for_each_patch macro (bsc#1071995 ).\n- livepatch: Module coming and going callbacks can proceed with all listed patches (bsc#1071995).\n- livepatch: Proper error handling in the shadow variables selftest (bsc#1071995).\n- livepatch: Remove ordering (stacking) of the livepatches (bsc#1071995).\n- livepatch: Remove signal sysfs attribute (bsc#1071995 ).\n- livepatch: return -ENOMEM on ptr_id() allocation failure (bsc#1071995).\n- livepatch: Send a fake signal periodically (bsc#1071995 ).\n- livepatch: Shuffle klp_enable_patch()/klp_disable_patch() code (bsc#1071995).\n- livepatch: Simplify API by removing registration step (bsc#1071995).\n- llc: do not use sk_eat_skb() (bsc#1051510).\n- locking/rwsem: Fix (possible) missed wakeup (bsc#1050549).\n- loop: drop caches if offset or block_size are changed (bsc#1124975).\n- loop: Reintroduce lo_ctl_mutex removed by commit 310ca162d (bsc#1124974).\n- mac80211: Add attribute aligned(2) to struct \u0027action\u0027 (bsc#1051510).\n- mac80211: do not initiate TDLS connection if station is not associated to AP (bsc#1051510).\n- mac80211: ensure that mgmt tx skbs have tailroom for encryption (bsc#1051510).\n- mac80211: fix miscounting of ttl-dropped frames (bsc#1051510).\n- mac80211: fix radiotap vendor presence bitmap handling (bsc#1051510).\n- mac80211: Fix Tx aggregation session tear down with ITXQs (bsc#1051510).\n- mac80211: Free mpath object when rhashtable insertion fails (bsc#1051510).\n- mac80211_hwsim: propagate genlmsg_reply return code (bsc#1051510).\n- mac80211: Restore vif beacon interval if start ap fails (bsc#1051510).\n- macvlan: Only deliver one copy of the frame to the macvlan interface (bsc#1051510).\n- mailbox: bcm-flexrm-mailbox: Fix FlexRM ring flush timeout issue (bsc#1051510).\n- mdio_bus: Fix use-after-free on device_register fails (bsc#1051510).\n- media: adv*/tc358743/ths8200: fill in min width/height/pixelclock (bsc#1051510).\n- media: DaVinci-VPBE: fix error handling in vpbe_initialize() (bsc#1051510).\n- media: dt-bindings: media: i2c: Fix i2c address for OV5645 camera sensor (bsc#1051510).\n- media: mtk-vcodec: Release device nodes in mtk_vcodec_init_enc_pm() (bsc#1051510).\n- media: rc: mce_kbd decoder: fix stuck keys (bsc#1100132).\n- media: s5k4ecgx: delete a bogus error message (bsc#1051510).\n- media: s5p-jpeg: Check for fmt_ver_flag when doing fmt enumeration (bsc#1051510).\n- media: s5p-jpeg: Correct step and max values for V4L2_CID_JPEG_RESTART_INTERVAL (bsc#1051510).\n- media: s5p-mfc: fix incorrect bus assignment in virtual child device (bsc#1051510).\n- media: uvcvideo: Avoid NULL pointer dereference at the end of streaming (bsc#1051510).\n- media: uvcvideo: Fix \u0027type\u0027 check leading to overflow (bsc#1051510).\n- media: v4l2-ctrls.c/uvc: zero v4l2_event (bsc#1051510).\n- media: v4l2: i2c: ov7670: Fix PLL bypass register values (bsc#1051510).\n- media: vb2: do not call __vb2_queue_cancel if vb2_start_streaming failed (bsc#1119086).\n- memremap: fix softlockup reports at teardown (bnc#1130154).\n- memstick: Prevent memstick host from getting runtime suspended during card detection (bsc#1051510).\n- mfd: db8500-prcmu: Fix some section annotations (bsc#1051510).\n- mfd: mc13xxx: Fix a missing check of a register-read failure (bsc#1051510).\n- mfd: mt6397: Do not call irq_domain_remove if PMIC unsupported (bsc#1051510).\n- mfd: qcom_rpm: write fw_version to CTRL_REG (bsc#1051510).\n- mfd: ti_am335x_tscadc: Use PLATFORM_DEVID_AUTO while registering mfd cells (bsc#1051510).\n- mfd: tps65218: Use devm_regmap_add_irq_chip and clean up error path in probe() (bsc#1051510).\n- mfd: twl-core: Fix section annotations on {,un}protect_pm_master (bsc#1051510).\n- mfd: wm5110: Add missing ASRC rate register (bsc#1051510).\n- misc: hpilo: Do not claim unsupported hardware (bsc#1129330).\n- misc: hpilo: Exclude unsupported device via blacklist (bsc#1129330).\n- mISDN: fix a race in dev_expire_timer() (bsc#1051510).\n- mlxsw: __mlxsw_sp_port_headroom_set(): Fix a use of local variable (git-fixes).\n- mlxsw: spectrum: Disable lag port TX before removing it (networking-stable-19_01_22).\n- mmap: introduce sane default mmap limits (git fixes (mm/mmap)).\n- mmap: relax file size limit for regular files (git fixes (mm/mmap)).\n- mmc: bcm2835: Recover from MMC_SEND_EXT_CSD (bsc#1051510).\n- mmc: Kconfig: Enable CONFIG_MMC_SDHCI_IO_ACCESSORS (bsc#1051510).\n- mmc: omap: fix the maximum timeout setting (bsc#1051510).\n- mmc: pxamci: fix enum type confusion (bsc#1051510).\n- mmc: sdhci-brcmstb: handle mmc_of_parse() errors during probe (bsc#1051510).\n- mmc: sdhci-esdhc-imx: fix HS400 timing issue (bsc#1051510).\n- mmc: sdhci-of-esdhc: Fix timeout checks (bsc#1051510).\n- mmc: sdhci-xenon: Fix timeout checks (bsc#1051510).\n- mmc: spi: Fix card detection during probe (bsc#1051510).\n- mm: do not drop unused pages when userfaultd is running (git fixes (mm/userfaultfd)).\n- mm: Fix modifying of page protection by insert_pfn() (bsc#1126740).\n- mm: Fix warning in insert_pfn() (bsc#1126740).\n- mm/hmm: hmm_pfns_bad() was accessing wrong struct (git fixes (mm/hmm)).\n- mm: hwpoison: use do_send_sig_info() instead of force_sig() (git fixes (mm/hwpoison)).\n- mm/ksm.c: ignore STABLE_FLAG of rmap_item-\u003eaddress in rmap_walk_ksm() (git fixes (mm/ksm)).\n- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (git fixes (mm/madvise)).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- mm: migrate: do not rely on __PageMovable() of newpage after unlocking it (git fixes (mm/migrate)).\n- mm, oom: fix use-after-free in oom_kill_process (git fixes (mm/oom)).\n- mm: use swp_offset as key in shmem_replace_page() (git fixes (mm/shmem)).\n- mm,vmscan: Make unregister_shrinker() no-op if register_shrinker() failed (git fixes (mm/vmscan)).\n- Move upstreamed ALSA and BT patches into sorted section\n- Move upstreamed libnvdimm patch into sorted section\n- mtd: cfi_cmdset_0002: Avoid walking all chips when unlocking (bsc#1051510).\n- mtd: cfi_cmdset_0002: Change write buffer to check correct value (bsc#1051510).\n- mtd: cfi_cmdset_0002: fix SEGV unlocking multiple chips (bsc#1051510).\n- mtd: cfi_cmdset_0002: Fix unlocking requests crossing a chip boudary (bsc#1051510).\n- mtd: cfi_cmdset_0002: Use right chip in do_ppb_xxlock() (bsc#1051510).\n- mtdchar: fix overflows in adjustment of `count` (bsc#1051510).\n- mtdchar: fix usage of mtd_ooblayout_ecc() (bsc#1051510).\n- mtd: docg3: do not set conflicting BCH_CONST_PARAMS option (bsc#1051510).\n- mtd/maps: fix solutionengine.c printk format warnings (bsc#1051510).\n- mtd: mtd_oobtest: Handle bitflips during reads (bsc#1051510).\n- mtd: nand: atmel: fix buffer overflow in atmel_pmecc_user (bsc#1051510).\n- mtd: nand: atmel: Fix get_sectorsize() function (bsc#1051510).\n- mtd: nand: atmel: fix of_irq_get() error check (bsc#1051510).\n- mtd: nand: brcmnand: Disable prefetch by default (bsc#1051510).\n- mtd: nand: brcmnand: Zero bitflip is not an error (bsc#1051510).\n- mtd: nand: denali_pci: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510).\n- mtd: nand: fix interpretation of NAND_CMD_NONE in nand_command[_lp]() (bsc#1051510).\n- mtd: nand: Fix nand_do_read_oob() return value (bsc#1051510).\n- mtd: nand: Fix writing mtdoops to nand flash (bsc#1051510).\n- mtd: nand: fsl_ifc: Fix nand waitfunc return value (bsc#1051510).\n- mtd: nand: gpmi: Fix failure when a erased page has a bitflip at BBM (bsc#1051510).\n- mtd: nand: ifc: update bufnum mask for ver \u003e= 2.0.0 (bsc#1051510).\n- mtd: nand: mtk: fix infinite ECC decode IRQ issue (bsc#1051510).\n- mtd: nand: omap2: Fix subpage write (bsc#1051510).\n- mtd: nand: pxa3xx: Fix READOOB implementation (bsc#1051510).\n- mtd: nand: qcom: Add a NULL check for devm_kasprintf() (bsc#1051510).\n- mtd: nandsim: remove debugfs entries in error path (bsc#1051510).\n- mtd: nand: sunxi: Fix ECC strength choice (bsc#1051510).\n- mtd: nand: sunxi: fix potential divide-by-zero error (bsc#1051510).\n- mtd: nand: vf610: set correct ooblayout (bsc#1051510).\n- mtd: spi-nor: cadence-quadspi: Fix page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: Fix Cadence QSPI page fault kernel panic (bsc#1051510).\n- mtd: spi-nor: fsl-quadspi: fix read error for flash size larger than 16MB (bsc#1051510).\n- mtd: spi-nor: stm32-quadspi: Fix uninitialized error return code (bsc#1051510).\n- mv88e6060: disable hardware level MAC learning (bsc#1051510).\n- nbd: Use set_blocksize() to set device blocksize (bsc#1124984).\n- net: add uevent socket member (bsc#1122982).\n- net: aquantia: driver should correctly declare vlan_features bits (bsc#1051510).\n- net: aquantia: fixed instack structure overflow (git-fixes).\n- net: aquantia: Fix hardware DMA stream overload on large MRRS (bsc#1051510).\n- net: bcmgenet: abort suspend on error (bsc#1051510).\n- net: bcmgenet: code movement (bsc#1051510).\n- net: bcmgenet: fix OF child-node lookup (bsc#1051510).\n- net: bcmgenet: remove HFB_CTRL access (bsc#1051510).\n- net: bcmgenet: return correct value \u0027ret\u0027 from bcmgenet_power_down (bsc#1051510).\n- net: bridge: fix a bug on using a neighbour cache entry without checking its state (networking-stable-19_01_20).\n- net: bridge: Fix ethernet header pointer before check skb forwardable (networking-stable-19_01_26).\n- net: do not call update_pmtu unconditionally (bsc#1123456).\n- net: Do not default Cavium PTP driver to \u0027y\u0027 (bsc#1110096).\n- net: dp83640: expire old TX-skb (networking-stable-19_02_10).\n- net: dsa: mv88e6xxx: handle unknown duplex modes gracefully in mv88e6xxx_port_set_duplex (git-fixes).\n- net: dsa: mv88x6xxx: mv88e6390 errata (networking-stable-19_01_22).\n- net: dsa: slave: Do not propagate flag changes on down slave interfaces (networking-stable-19_02_10).\n- net: ena: fix race between link up and device initalization (bsc#1083548).\n- net: ena: update driver version from 2.0.2 to 2.0.3 (bsc#1129276 bsc#1125342).\n- netfilter: check for seqadj ext existence before adding it in nf_nat_setup_info (git-fixes).\n- netfilter: nf_tables: check the result of dereferencing base_chain-\u003estats (git-fixes).\n- net: Fix usage of pskb_trim_rcsum (networking-stable-19_01_26).\n- net: ipv4: Fix memory leak in network namespace dismantle (networking-stable-19_01_26).\n- net/mlx4_core: Add masking for a few queries on HCA caps (networking-stable-19_02_01).\n- net/mlx4_core: Fix locking in SRIOV mode when switching between events and polling (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx5e: Allow MAC invalidation while spoofchk is ON (networking-stable-19_02_01).\n- net/mlx5e: IPoIB, Fix RX checksum statistics update (git-fixes).\n- net/mlx5e: RX, Fix wrong early return in receive queue poll (bsc#1046305).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Release resource on error flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net/mlx5: Use multi threaded workqueue for page fault handling (git-fixes).\n- net/ncsi: Fix AEN HNCDSC packet length (git-fixes).\n- net/ncsi: Stop monitor if channel times out or is inactive (git-fixes).\n- net: netem: fix skb length BUG_ON in __skb_to_sgvec (git-fixes).\n- netns: restrict uevents (bsc#1122982).\n- net: phy: marvell: Errata for mv88e6390 internal PHYs (networking-stable-19_01_26).\n- net: phy: mdio_bus: add missing device_del() in mdiobus_register() error handling (networking-stable-19_01_26).\n- net: phy: Micrel KSZ8061: link failure after cable connect (git-fixes).\n- netrom: switch to sock timer API (bsc#1051510).\n- net/rose: fix NULL ax25_cb kernel panic (networking-stable-19_02_01).\n- net/sched: act_tunnel_key: fix memory leak in case of action replace (networking-stable-19_01_26).\n- net_sched: refetch skb protocol for each filter (networking-stable-19_01_26).\n- net: set default network namespace in init_dummy_netdev() (networking-stable-19_02_01).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: stmmac: fix broken dma_interrupt handling for multi-queues (git-fixes).\n- net: stmmac: handle endianness in dwmac4_get_timestamp (git-fixes).\n- net: stmmac: Use mutex instead of spinlock (git-fixes).\n- net-sysfs: Fix mem leak in netdev_register_kobject (git-fixes).\n- net: systemport: Fix WoL with password after deep sleep (networking-stable-19_02_10).\n- net: thunderx: fix NULL pointer dereference in nic_remove (git-fixes).\n- nfit: acpi_nfit_ctl(): Check out_obj-\u003etype in the right place (bsc#1129547).\n- nfit/ars: Attempt a short-ARS whenever the ARS state is idle at boot (bsc#1051510).\n- nfit/ars: Attempt short-ARS even in the no_init_ars case (bsc#1051510).\n- nfp: bpf: fix ALU32 high bits clearance bug (git-fixes).\n- nfsd: fix memory corruption caused by readdir (bsc#1127445).\n- niu: fix missing checks of niu_pci_eeprom_read (bsc#1051510).\n- ntb_transport: Fix bug with max_mw_size parameter (bsc#1051510).\n- nvme-fc: reject reconnect if io queue count is reduced to zero (bsc#1128351).\n- nvme: flush namespace scanning work just before removing namespaces (bsc#1108101).\n- nvme: kABI fix for scan_lock (bsc#1123882).\n- nvme: lock NS list changes while handling command effects (bsc#1123882).\n- nvme-loop: fix kernel oops in case of unhandled command (bsc#1126807).\n- nvme-multipath: drop optimization for static ANA group IDs (bsc#1113939).\n- nvme-pci: fix out of bounds access in nvme_cqe_pending (bsc#1127595).\n- nvme: schedule requeue whenever a LIVE state is entered (bsc#1123105).\n- of, numa: Validate some distance map rules (bsc#1051510).\n- of: unittest: Disable interrupt node tests for old world MAC systems (bsc#1051510).\n- openvswitch: Avoid OOB read when parsing flow nlattrs (bsc#1051510).\n- openvswitch: fix the incorrect flow action alloc size (bsc#1051510).\n- openvswitch: Remove padding from packet before L3+ conntrack processing (bsc#1051510).\n- parport_pc: fix find_superio io compare code, should use equal test (bsc#1051510).\n- Partially revert \u0027block: fail op_is_write() requests to (bsc#1125252).\n- pci: add USR vendor id and use it in r8169 and w6692 driver (networking-stable-19_01_22).\n- pci: designware-ep: dw_pcie_ep_set_msi() should only set MMC bits (bsc#1051510).\n- pci: endpoint: functions: Use memcpy_fromio()/memcpy_toio() (bsc#1051510).\n- pci-hyperv: increase HV_VP_SET_BANK_COUNT_MAX to handle 1792 vcpus (bsc#1122822).\n- pci/pme: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1051510).\n- pci: qcom: Do not deassert reset GPIO during probe (bsc#1129281).\n- pcrypt: use format specifier in kobject_add (bsc#1051510).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phy: allwinner: sun4i-usb: poll vbus changes on A23/A33 when driving VBUS (bsc#1051510).\n- phy: qcom-qmp: Fix failure path in phy_init functions (bsc#1051510).\n- phy: qcom-qmp: Fix phy pipe clock gating (bsc#1051510).\n- phy: renesas: rcar-gen3-usb2: fix vbus_ctrl for role sysfs (bsc#1051510).\n- phy: rockchip-emmc: retry calpad busy trimming (bsc#1051510).\n- phy: sun4i-usb: add support for missing USB PHY index (bsc#1051510).\n- phy: tegra: remove redundant self assignment of \u0027map\u0027 (bsc#1051510).\n- phy: work around \u0027phys\u0027 references to usb-nop-xceiv devices (bsc#1051510).\n- pinctrl: max77620: Use define directive for max77620_pinconf_param values (bsc#1051510).\n- pinctrl: meson: fix pull enable register calculation (bsc#1051510).\n- pinctrl: meson: meson8b: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: meson: meson8b: fix the sdxc_a data 1..3 pins (bsc#1051510).\n- pinctrl: meson: meson8: fix the GPIO function for the GPIOAO pins (bsc#1051510).\n- pinctrl: msm: fix gpio-hog related boot issues (bsc#1051510).\n- pinctrl: sh-pfc: emev2: Add missing pinmux functions (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing LCD0 marks to lcd0_data24_1 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7740: Add missing REF125CK pin to gether_gmii group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7778: Fix HSPI pin numbers and names (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Fix scifb2_data_c pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus ctrl marks from qspi_data4_b group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7791: Remove bogus marks from vin1_b_data18 group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7792: Fix vin1_data18_b pin group (bsc#1051510).\n- pinctrl: sh-pfc: r8a7794: Remove bogus IPSR9 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7264: Fix PFCR3 and PFCR0 register configuration (bsc#1051510).\n- pinctrl: sh-pfc: sh7269: Add missing PCIOR0 field (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Add missing TO pin to tpu4_to3 group (bsc#1051510).\n- pinctrl: sh-pfc: sh73a0: Fix fsic_spdif pin groups (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Add missing IPSR11 field (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Fix shifted values in IPSR10 (bsc#1051510).\n- pinctrl: sh-pfc: sh7734: Remove bogus IPSR10 value (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function csi0 to csi (bsc#1051510).\n- pinctrl: sunxi: a64: Rename function ts0 to ts (bsc#1051510).\n- pinctrl: sunxi: a83t: Fix IRQ offset typo for PH11 (bsc#1051510).\n- pinctrl: sx150x: handle failure case of devm_kstrdup (bsc#1051510).\n- pktcdvd: Fix possible Spectre-v1 for pkt_devs (bsc#1051510).\n- platform/x86: Fix unmet dependency warning for SAMSUNG_Q10 (bsc#1051510).\n- pm / wakeup: Rework wakeup source timer cancellation (bsc#1051510).\n- powercap: intel_rapl: add support for Jacobsville ().\n- powerpc/64s: Clear on-stack exception marker upon exception return (bsc#1071995).\n- powerpc/livepatch: relax reliable stack tracer checks for first-frame (bsc#1071995).\n- powerpc/livepatch: small cleanups in save_stack_trace_tsk_reliable() (bsc#1071995).\n- powerpc/pseries: export timebase register sample in lparcfg (bsc#1127750).\n- powerpc/pseries/mce: Fix misleading print for TLB mutlihit (bsc#1094244, git-fixes).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1125728).\n- power: supply: charger-manager: Fix incorrect return value (bsc#1051510).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- proc/sysctl: do not return ENOMEM on lookup when a table is unregistering (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- ptp: check gettime64 return code in PTP_SYS_OFFSET ioctl (bsc#1051510).\n- ptp: Fix pass zero to ERR_PTR() in ptp_clock_register (bsc#1051510).\n- pwm-backlight: Enable/disable the PWM before/after LCD enable toggle (bsc#1051510).\n- qmi_wwan: add MTU default to qmap network interface (networking-stable-19_01_22).\n- qmi_wwan: apply SET_DTR quirk to Sierra WP7607 (bsc#1051510).\n- qmi_wwan: Fix qmap header retrieval in qmimux_rx_fixup (bsc#1051510).\n- r8169: Add support for new Realtek Ethernet (networking-stable-19_01_22).\n- r8169: use PCI_VDEVICE macro (networking-stable-19_01_22).\n- rbd: do not return 0 on unmap if RBD_DEV_FLAG_REMOVING is set (bsc#1125797).\n- rcu: Fix up pending cbs check in rcu_prepare_for_idle (git fixes (kernel/rcu)).\n- rcu: Make need_resched() respond to urgent RCU-QS needs (git fixes (kernel/rcu)).\n- rdma/vmw_pvrdma: Support upto 64-bit PFNs (bsc#1127285).\n- Refresh patches.suse/scsi-do-not-print-reservation-conflict-for-TEST-UNIT.patch (bsc#1119843)\n- regulator: act8865: Fix act8600_sudcdc_voltage_ranges setting (bsc#1051510).\n- regulator: max77620: Initialize values for DT properties (bsc#1051510).\n- regulator: pv88060: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88080: Fix array out-of-bounds access (bsc#1051510).\n- regulator: pv88090: Fix array out-of-bounds access (bsc#1051510).\n- regulator: s2mpa01: Fix step values for some LDOs (bsc#1051510).\n- regulator: s2mps11: Fix steps for buck7, buck8 and LDO35 (bsc#1051510).\n- regulator: wm831x-dcdc: Fix list of wm831x_dcdc_ilim from mA to uA (bsc#1051510).\n- Remove blacklist of virtio patch so we can install it (bsc#1114585)\n- Remove patches rejected upstream ().\n- Revert drm/i915 patches that caused regressions (bsc#1131062)\n- Revert \u0027drm/rockchip: Allow driver to be shutdown on reboot/kexec\u0027 (bsc#1051510).\n- Revert \u0027Input: elan_i2c - add ACPI ID for touchpad in ASUS Aspire F5-573G\u0027 (bsc#1051510).\n- Revert \u0027ipv4: keep skb-\u003edst around in presence of IP options\u0027 (git-fixes).\n- Revert \u0027openvswitch: Fix template leak in error cases.\u0027 (bsc#1051510).\n- Revert \u0027scsi: qla2xxx: Fix NVMe Target discovery\u0027 (bsc#1125252).\n- Revert \u0027sd: disable logical block provisioning if \u0027lbpme\u0027 is not set\u0027 This reverts commit e365f138cb9c9c48b710864a9f37a91b4b93381d. Patch not accepted upstream.\n- Revert the previous merge of drm fixes The branch was merged mistakenly and breaks the build. Revert it.\n- Revert \u0027xhci: Reset Renesas uPD72020x USB controller for 32-bit DMA issue\u0027 (bsc#1120854).\n- rhashtable: Still do rehash when we get EEXIST (bsc#1051510).\n- rocker: fix rocker_tlv_put_* functions for KASAN (bsc#1051510).\n- rpm/kernel-source.changes.old: Really drop old changelogs (bsc#1098995)\n- rt2800: enable TX_PIN_CFG_RFRX_EN only for MT7620 (bsc#1120902).\n- rtc: 88pm80x: fix unintended sign extension (bsc#1051510).\n- rtc: 88pm860x: fix unintended sign extension (bsc#1051510).\n- rtc: cmos: ignore bogus century byte (bsc#1051510).\n- rtc: ds1672: fix unintended sign extension (bsc#1051510).\n- rtc: Fix overflow when converting time64_t to rtc_time (bsc#1051510).\n- rtc: pm8xxx: fix unintended sign extension (bsc#1051510).\n- rtnetlink: bring NETDEV_CHANGE_TX_QUEUE_LEN event process back in rtnetlink_event (git-fixes).\n- rtnetlink: bring NETDEV_CHANGEUPPER event process back in rtnetlink_event (git-fixes).\n- rtnetlink: bring NETDEV_POST_TYPE_CHANGE event process back in rtnetlink_event (git-fixes).\n- rtnetlink: check DO_SETLINK_NOTIFY correctly in do_setlink (git-fixes).\n- rxrpc: bad unlock balance in rxrpc_recvmsg (networking-stable-19_02_10).\n- s390/cio: Fix how vfio-ccw checks pinned pages (git-fixes).\n- s390/cpum_cf: Reject request for sampling in event initialization (git-fixes).\n- s390/early: improve machine detection (git-fixes).\n- s390/mm: always force a load of the primary ASCE on context switch (git-fixes).\n- s390/mm: fix addressing exception after suspend/resume (bsc#1125252).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- s390/qeth: conclude all event processing before offlining a card (LTC#175901, bsc#1127567).\n- s390/qeth: fix use-after-free in error path (bsc#1127534).\n- s390/qeth: invoke softirqs after napi_schedule() (git-fixes).\n- s390/smp: Fix calling smp_call_ipl_cpu() from ipl CPU (git-fixes).\n- s390/smp: fix CPU hotplug deadlock with CPU rescan (git-fixes).\n- s390/sthyi: Fix machine name validity indication (git-fixes).\n- sata_rcar: fix deferred probing (bsc#1051510).\n- sc16is7xx: Fix for multi-channel stall (bsc#1051510).\n- sched: Do not re-read h_load_next during hierarchical load calculation (bnc#1120909).\n- sched/wake_q: Document wake_q_add() (bsc#1050549).\n- sched/wake_q: Fix wakeup ordering for wake_q (bsc#1050549).\n- sched/wake_q: Reduce reference counting for special users (bsc#1050549).\n- sch_multiq: fix double free on init failure (bsc#1051510).\n- scripts/git_sort/git_sort.py: add vfs \u0027fixes\u0027 branch\n- scsi: core: reset host byte in DID_NEXUS_FAILURE case (bsc#1122764).\n- scsi: csiostor: remove flush_scheduled_work() (bsc#1127363).\n- scsi: fix queue cleanup race before queue initialization is done (bsc#1125252).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: ibmvscsi: Protect ibmvscsi_head from concurrent modificaiton (bsc#1119019).\n- scsi: libiscsi: fix possible NULL pointer dereference in case of TMF (bsc#1127378).\n- scsi: libiscsi: Fix race between iscsi_xmit_task and iscsi_complete_task (bsc#1122192).\n- scsi: lpfc: Add log messages to aid in debugging fc4type discovery issues (bsc#1121317).\n- scsi: lpfc: Correct MDS loopback diagnostics support (bsc#1121317).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1121317).\n- scsi: lpfc: Fix discovery failure when PLOGI is defered (bsc#1121317).\n- scsi: lpfc: Fix link state reporting for trunking when adapter is offline (bsc#1121317).\n- scsi: lpfc: fix remoteport access (bsc#1125252).\n- scsi: lpfc: remove an unnecessary NULL check (bsc#1121317).\n- scsi: lpfc: update fault value on successful trunk events (bsc#1121317).\n- scsi: lpfc: Update lpfc version to 12.0.0.10 (bsc#1121317).\n- scsi: mpt3sas: Add ioc_\u003clevel\u003e logging macros (bsc#1117108).\n- scsi: mpt3sas: Annotate switch/case fall-through (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT and reply_q_name to %s: (bsc#1117108).\n- scsi: mpt3sas: Convert logging uses with MPT3SAS_FMT without logging levels (bsc#1117108).\n- scsi: mpt3sas: Convert mlsleading uses of pr_\u003clevel\u003e with MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Convert uses of pr_\u003clevel\u003e with MPT3SAS_FMT to ioc_\u003clevel\u003e (bsc#1117108).\n- scsi: mpt3sas: Fix a race condition in mpt3sas_base_hard_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Fix indentation (bsc#1117108).\n- scsi: mpt3sas: Improve kernel-doc headers (bsc#1117108).\n- scsi: mpt3sas: Introduce struct mpt3sas_nvme_cmd (bsc#1117108).\n- scsi: mpt3sas: Remove KERN_WARNING from panic uses (bsc#1117108).\n- scsi: mpt3sas: Remove set-but-not-used variables (bsc#1117108).\n- scsi: mpt3sas: Remove unnecessary parentheses and simplify null checks (bsc#1117108).\n- scsi: mpt3sas: Remove unused macro MPT3SAS_FMT (bsc#1117108).\n- scsi: mpt3sas: Split _base_reset_handler(), mpt3sas_scsih_reset_handler() and mpt3sas_ctl_reset_handler() (bsc#1117108).\n- scsi: mpt3sas: Swap I/O memory read value back to cpu endianness (bsc#1117108).\n- scsi: mpt3sas: switch to generic DMA API (bsc#1117108).\n- scsi: mpt3sas: Use dma_pool_zalloc (bsc#1117108).\n- scsi: mptsas: Fixup device hotplug for VMWare ESXi (bsc#1129046).\n- scsi: qla2xxx: Enable FC-NVME on NPIV ports (bsc#1094555).\n- scsi: qla2xxx: Fix a typo in MODULE_PARM_DESC (bsc#1094555).\n- scsi: qla2xxx: Fix for FC-NVMe discovery for NPIV port (bsc#1094555).\n- scsi: qla2xxx: Fix NPIV handling for FC-NVMe (bsc#1094555).\n- scsi: qla2xxx: Initialize port speed to avoid setting lower speed (bsc#1094555).\n- scsi: qla2xxx: Modify fall-through annotations (bsc#1094555).\n- scsi: qla2xxx: Remove unnecessary self assignment (bsc#1094555).\n- scsi: qla2xxx: Simplify conditional check (bsc#1094555).\n- scsi: qla2xxx: Update driver version to 10.00.00.12-k (bsc#1094555).\n- scsi: storvsc: Fix a race in sub-channel creation that can cause panic ().\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- scsi: virtio_scsi: fix pi_bytes{out,in} on 4 KiB block size devices (bsc#1114585).\n- sctp: add a ceiling to optlen in some sockopts (bnc#1129163).\n- sctp: improve the events for sctp stream adding (networking-stable-19_02_01).\n- sctp: improve the events for sctp stream reset (networking-stable-19_02_01).\n- sd: disable logical block provisioning if \u0027lbpme\u0027 is not set (bsc#1086095 bsc#1078355).\n- selftests/livepatch: add DYNAMIC_DEBUG config dependency (bsc#1071995).\n- selftests/livepatch: introduce tests (bsc#1071995).\n- selinux: always allow mounting submounts (bsc#1051510).\n- seq_buf: Make seq_buf_puts() null-terminate the buffer (bsc#1051510).\n- serial: 8250_of: assume reg-shift of 2 for mrvl,mmp-uart (bsc#1051510).\n- serial: 8250_pci: Fix number of ports for ACCES serial cards (bsc#1051510).\n- serial: 8250_pci: Have ACCES cards that use the four port Pericom PI7C9X7954 chip use the pci_pericom_setup() (bsc#1051510).\n- serial: fix race between flush_to_ldisc and tty_open (bsc#1051510).\n- serial: fsl_lpuart: clear parity enable bit when disable parity (bsc#1051510).\n- serial: fsl_lpuart: fix maximum acceptable baud rate with over-sampling (bsc#1051510).\n- serial: imx: Update cached mctrl value when changing RTS (bsc#1051510).\n- serial: uartps: Fix stuck ISR if RX disabled with non-empty FIFO (bsc#1051510).\n- skge: potential memory corruption in skge_get_regs() (bsc#1051510).\n- sky2: Disable MSI on Dell Inspiron 1545 and Gateway P-79 (bsc#1051510).\n- sky2: Increase D3 delay again (bsc#1051510).\n- smb311: Improve checking of negotiate security contexts (bsc#1051510).\n- smb3: Enable encryption for SMB3.1.1 (bsc#1051510).\n- smb3: Fix 3.11 encryption to Windows and handle encrypted smb3 tcon (bsc#1051510).\n- smb3: Fix SMB3.1.1 guest mounts to Samba (bsc#1051510).\n- smb3: remove noisy warning message on mount (bsc#1129664).\n- soc: bcm: brcmstb: Do not leak device tree node reference (bsc#1051510).\n- soc: fsl: qbman: avoid race in clearing QMan interrupt (bsc#1051510).\n- soc/tegra: Do not leak device tree node reference (bsc#1051510).\n- spi: pxa2xx: Setup maximum supported DMA transfer length (bsc#1051510).\n- spi: ti-qspi: Fix mmap read when more than one CS in use (bsc#1051510).\n- spi/topcliff_pch: Fix potential NULL dereference on allocation error (bsc#1051510).\n- splice: do not merge into linked buffers (git-fixes).\n- staging: comedi: ni_660x: fix missing break in switch statement (bsc#1051510).\n- staging:iio:ad2s90: Make probe handle spi_setup failure (bsc#1051510).\n- staging: iio: ad7780: update voltage on read (bsc#1051510).\n- staging: iio: adc: ad7280a: handle error from __ad7280_read32() (bsc#1051510).\n- staging: iio: adt7316: allow adt751x to use internal vref for all dacs (bsc#1051510).\n- staging: iio: adt7316: fix register and bit definitions (bsc#1051510).\n- staging: iio: adt7316: fix the dac read calculation (bsc#1051510).\n- staging: iio: adt7316: fix the dac write calculation (bsc#1051510).\n- staging: rtl8723bs: Fix build error with Clang when inlining is disabled (bsc#1051510).\n- staging: speakup: Replace strncpy with memcpy (bsc#1051510).\n- staging: wilc1000: fix to set correct value for \u0027vif_num\u0027 (bsc#1051510).\n- supported.conf\n- svm: Add mutex_lock to protect apic_access_page_done on AMD systems (bsc#1129285).\n- svm: Fix improper check when deactivate AVIC (bsc#1130335).\n- swiotlb: Add is_swiotlb_active() function (bsc#1120008).\n- swiotlb: Introduce swiotlb_max_mapping_size() (bsc#1120008).\n- switchtec: Fix SWITCHTEC_IOCTL_EVENT_IDX_ALL flags overwrite (bsc#1051510).\n- switchtec: Remove immediate status check after submitting MRPC command (bsc#1051510).\n- sysfs: Disable lockdep for driver bind/unbind files (bsc#1051510).\n- tcp: batch tcp_net_metrics_exit (bsc#1122982).\n- tcp: change txhash on SYN-data timeout (networking-stable-19_01_20).\n- tcp: handle inet_csk_reqsk_queue_add() failures (git-fixes).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bsc#1051510).\n- team: Free BPF filter when unregistering netdev (bsc#1051510).\n- thermal: bcm2835: Fix crash in bcm2835_thermal_debugfs (bsc#1051510).\n- thermal: do not clear passive state during system sleep (bsc#1051510).\n- thermal/drivers/hisi: Encapsulate register writes into helpers (bsc#1051510).\n- thermal/drivers/hisi: Fix configuration register setting (bsc#1051510).\n- thermal: generic-adc: Fix adc to temp interpolation (bsc#1051510).\n- thermal: hwmon: inline helpers when CONFIG_THERMAL_HWMON is not set (bsc#1051510).\n- thermal/intel_powerclamp: fix truncated kthread name ().\n- thermal: mediatek: fix register index error (bsc#1051510).\n- timekeeping: Use proper seqcount initializer (bsc#1051510).\n- tipc: eliminate KMSAN uninit-value in strcmp complaint (bsc#1051510).\n- tipc: error path leak fixes in tipc_enable_bearer() (bsc#1051510).\n- tipc: fix a race condition of releasing subscriber object (bsc#1051510).\n- tipc: fix bug in function tipc_nl_node_dump_monitor (bsc#1051510).\n- tipc: fix infinite loop when dumping link monitor summary (bsc#1051510).\n- tipc: fix RDM/DGRAM connect() regression (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_bearer_enable (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_doit (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_reset_stats (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_link_set (bsc#1051510).\n- tipc: fix uninit-value in tipc_nl_compat_name_table_dump (bsc#1051510).\n- tpm: fix kdoc for tpm2_flush_context_cmd() (bsc#1051510).\n- tpm: Fix some name collisions with drivers/char/tpm.h (bsc#1051510).\n- tpm: return a TPM_RC_COMMAND_CODE response if command is not implemented (bsc#1051510).\n- tpm: Return the actual size when receiving an unsupported command (bsc#1051510).\n- tpm: suppress transmit cmd error logs when TPM 1.2 is disabled/deactivated (bsc#1051510).\n- tpm_tis_spi: Pass the SPI IRQ down to the driver (bsc#1051510).\n- tpm/tpm_crb: Avoid unaligned reads in crb_recv() (bsc#1051510).\n- tpm/tpm_i2c_infineon: switch to i2c_lock_bus(..., I2C_LOCK_SEGMENT) (bsc#1051510).\n- tpm: tpm_i2c_nuvoton: use correct command duration for TPM 2.x (bsc#1051510).\n- tpm: tpm_try_transmit() refactor error flow (bsc#1051510).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- tracing/uprobes: Fix output for multiple string arguments (bsc#1126495).\n- tracing: Use strncpy instead of memcpy for string keys in hist triggers (bsc#1129625).\n- Tree connect for SMB3.1.1 must be signed for non-encrypted shares (bsc#1051510).\n- tty: ipwireless: Fix potential NULL pointer dereference (bsc#1051510).\n- tty: serial: samsung: Properly set flags in autoCTS mode (bsc#1051510).\n- ucc_geth: Reset BQL queue when stopping device (networking-stable-19_02_01).\n- ucma: fix a use-after-free in ucma_resolve_ip() (bsc#1051510).\n- uevent: add alloc_uevent_skb() helper (bsc#1122982).\n- uio: Reduce return paths from uio_write() (bsc#1051510).\n- Update config files. Remove conditional support for SMB2 and SMB3:\n- Update patches.arch/s390-sles15-zcrypt-fix-specification-exception.patch (LTC#174936, bsc#1123060, bsc#1123061).\n- Update patches.fixes/acpi-nfit-Block-function-zero-DSMs.patch (bsc#1051510, bsc#1121789).\n- Update patches.fixes/acpi-nfit-Fix-command-supported-detection.patch (bsc#1051510, bsc#1121789). Add more detailed bugzilla reference.\n- uprobes: Fix handle_swbp() vs. unregister() + register() race once more (bsc#1051510).\n- usb: Add new USB LPM helpers (bsc#1120902).\n- usb: cdc-acm: fix race during wakeup blocking TX traffic (bsc#1129770).\n- usb: common: Consider only available nodes for dr_mode (bsc#1129770).\n- usb: Consolidate LPM checks to avoid enabling LPM twice (bsc#1120902).\n- usb: core: only clean up what we allocated (bsc#1051510).\n- usb: dwc3: Correct the logic for checking TRB full in __dwc3_prepare_one_trb() (bsc#1051510).\n- usb: dwc3: gadget: Disable CSP for stream OUT ep (bsc#1051510).\n- usb: dwc3: gadget: Fix the uninitialized link_state when udc starts (bsc#1051510).\n- usb: dwc3: gadget: Handle 0 xfer length for OUT EP (bsc#1051510).\n- usb: dwc3: gadget: synchronize_irq dwc irq in suspend (bsc#1051510).\n- usb: gadget: f_hid: fix deadlock in f_hidg_write() (bsc#1129770).\n- usb: gadget: musb: fix short isoc packets with inventra dma (bsc#1051510).\n- usb: gadget: Potential NULL dereference on allocation error (bsc#1051510).\n- usb: gadget: udc: net2272: Fix bitwise and boolean operations (bsc#1051510).\n- usb: hub: delay hub autosuspend if USB3 port is still link training (bsc#1051510).\n- usb: mtu3: fix the issue about SetFeature(U1/U2_Enable) (bsc#1051510).\n- usb: musb: dsps: fix otg state machine (bsc#1051510).\n- usb: musb: dsps: fix runtime pm for peripheral mode (bsc#1120902).\n- usbnet: smsc95xx: fix rx packet alignment (bsc#1051510).\n- usb: phy: am335x: fix race condition in _probe (bsc#1051510).\n- usb: phy: fix link errors (bsc#1051510).\n- usb: phy: twl6030-usb: fix possible use-after-free on remove (bsc#1051510).\n- usb: serial: cp210x: add ID for Ingenico 3070 (bsc#1129770).\n- usb: serial: ftdi_sio: add ID for Hjelmslund Electronics USB485 (bsc#1129770).\n- usb: serial: mos7720: fix mos_parport refcount imbalance on error path (bsc#1129770).\n- usb: serial: option: add Telit ME910 ECM composition (bsc#1129770).\n- usb: serial: option: set driver_info for SIM5218 and compatibles (bsc#1129770).\n- usb: serial: pl2303: add new PID to support PL2303TB (bsc#1051510).\n- usb: serial: simple: add Motorola Tetra TPG2200 device id (bsc#1051510).\n- veth: set peer GSO values (bsc#1051510).\n- vfio: ccw: fix cleanup if cp_prefetch fails (git-fixes).\n- vfio: ccw: process ssch with interrupts disabled (git-fixes).\n- vfs: Add iomap_seek_hole and iomap_seek_data helpers (bsc#1070995).\n- vfs: Add page_cache_seek_hole_data helper (bsc#1070995).\n- vfs: in iomap seek_{hole,data}, return -ENXIO for negative offsets (bsc#1070995).\n- vhost: correctly check the return value of translate_desc() in log_used() (bsc#1051510).\n- vhost: log dirty page correctly (networking-stable-19_01_26).\n- vhost/vsock: fix uninitialized vhost_vsock-\u003eguest_cid (bsc#1051510).\n- video: clps711x-fb: release disp device node in probe() (bsc#1051510).\n- virtio-blk: Consider virtio_max_dma_size() for maximum segment size (bsc#1120008).\n- virtio: Introduce virtio_max_dma_size() (bsc#1120008).\n- virtio_net: Do not call free_old_xmit_skbs for xdp_frames (networking-stable-19_02_01).\n- virtio/s390: avoid race on vcdev-\u003econfig (git-fixes).\n- virtio/s390: fix race in ccw_io_helper() (git-fixes).\n- vmci: Support upto 64-bit PPNs (bsc#1127286).\n- vsock: cope with memory allocation failure at socket creation time (bsc#1051510).\n- vxge: ensure data0 is initialized in when fetching firmware version information (bsc#1051510).\n- vxlan: Fix GRO cells race condition between receive and link delete (git-fixes).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling gro_cells_receive() (git-fixes).\n- vxlan: update skb dst pmtu on tx path (bsc#1123456).\n- w90p910_ether: remove incorrect __init annotation (bsc#1051510).\n- watchdog: docs: kernel-api: do not reference removed functions (bsc#1051510).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86/a.out: Clear the dump structure initially (bsc#1114279).\n- x86/apic: Provide apic_ack_irq() (bsc#1122822).\n- x86/boot/e820: Avoid overwriting e820_table_firmware (bsc#1127154).\n- x86/boot/e820: Introduce the bootloader provided e820_table_firmware[] table (bsc#1127154).\n- x86/boot/e820: Rename the e820_table_firmware to e820_table_kexec (bsc#1127154).\n- x86/cpu: Add Atom Tremont (Jacobsville) ().\n- x86/CPU/AMD: Set the CPB bit unconditionally on F17h (bsc#1114279).\n- x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (bsc#1127307).\n- x86/Hyper-V: Set x2apic destination mode to physical when x2apic is available (bsc#1122822).\n- x86/kaslr: Fix incorrect i8254 outb() parameters (bsc#1114279).\n- x86/mce: Improve error message when kernel cannot recover, p2 (bsc#1114279).\n- x86/mtrr: Do not copy uninitialized gentry fields back to userspace (bsc#1114279).\n- x86/pkeys: Properly copy pkey state at fork() (bsc#1129366).\n- x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls (bsc#1125614).\n- x86: respect memory size limiting via mem= parameter (bsc#1117645).\n- x86/vdso: Remove obsolete \u0027fake section table\u0027 reservation (bsc#1114279).\n- x86/xen: dont add memory above max allowed allocation (bsc#1117645).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: fix dom0 boot on huge systems (bsc#1127836).\n- xen/manage: do not complain about an empty value in control/sysrq node (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: add option to mount with barrier=0 or barrier=1 (bsc#1088133).\n- xfs: fix contiguous dquot chunk iteration livelock (bsc#1070995).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n- xfs: rewrite xfs_dq_get_next_id using xfs_iext_lookup_extent (bsc#1070995).\n- xfs: Switch to iomap for SEEK_HOLE / SEEK_DATA (bsc#1070995).\n- yama: Check for pid death before checking ancestry (bsc#1051510).\n- yam: fix a missing-check bug (bsc#1051510).\n- zswap: re-check zswap_is_full() after do zswap_shrink() (bsc#1051510).\n- x86/uaccess: Do not leak the AC flag into __put_user() value evaluation (bsc#1114279).\n", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-2019-1193", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_1193-1.json" }, { "category": "self", "summary": "URL for openSUSE-SU-2019:1193-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KB6SDNTTTOZR257SKNDSIEN2KHPJ3OSB/#KB6SDNTTTOZR257SKNDSIEN2KHPJ3OSB" }, { "category": "self", "summary": "E-Mail link for openSUSE-SU-2019:1193-1", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KB6SDNTTTOZR257SKNDSIEN2KHPJ3OSB/#KB6SDNTTTOZR257SKNDSIEN2KHPJ3OSB" }, { "category": "self", "summary": "SUSE Bug 1046305", "url": "https://bugzilla.suse.com/1046305" }, { "category": "self", "summary": "SUSE Bug 1046306", "url": "https://bugzilla.suse.com/1046306" }, { "category": "self", "summary": "SUSE Bug 1050549", "url": "https://bugzilla.suse.com/1050549" }, { "category": "self", "summary": "SUSE Bug 1051510", "url": "https://bugzilla.suse.com/1051510" }, { "category": "self", "summary": "SUSE Bug 1056787", "url": "https://bugzilla.suse.com/1056787" }, { "category": "self", "summary": "SUSE Bug 1060463", "url": "https://bugzilla.suse.com/1060463" }, { "category": "self", "summary": "SUSE Bug 1063638", "url": "https://bugzilla.suse.com/1063638" }, { "category": "self", "summary": "SUSE Bug 1065600", "url": "https://bugzilla.suse.com/1065600" }, { "category": "self", "summary": "SUSE Bug 1070995", "url": "https://bugzilla.suse.com/1070995" }, { "category": "self", "summary": "SUSE Bug 1071995", "url": "https://bugzilla.suse.com/1071995" }, { "category": "self", "summary": "SUSE Bug 1078355", "url": "https://bugzilla.suse.com/1078355" }, { "category": "self", "summary": "SUSE Bug 1082943", "url": "https://bugzilla.suse.com/1082943" }, { "category": "self", "summary": "SUSE Bug 1083548", "url": "https://bugzilla.suse.com/1083548" }, { "category": "self", "summary": "SUSE Bug 1083647", "url": "https://bugzilla.suse.com/1083647" }, { "category": "self", "summary": "SUSE Bug 1086095", "url": "https://bugzilla.suse.com/1086095" }, { "category": "self", "summary": "SUSE Bug 1086282", "url": "https://bugzilla.suse.com/1086282" }, { "category": "self", "summary": "SUSE Bug 1088133", "url": "https://bugzilla.suse.com/1088133" }, { "category": "self", "summary": "SUSE Bug 1094244", "url": "https://bugzilla.suse.com/1094244" }, { "category": "self", "summary": "SUSE Bug 1094555", "url": "https://bugzilla.suse.com/1094555" }, { "category": "self", "summary": "SUSE Bug 1098995", "url": "https://bugzilla.suse.com/1098995" }, { "category": "self", "summary": "SUSE Bug 1100132", "url": "https://bugzilla.suse.com/1100132" }, { "category": "self", "summary": "SUSE Bug 1103429", "url": "https://bugzilla.suse.com/1103429" }, { "category": "self", "summary": "SUSE Bug 1106811", "url": "https://bugzilla.suse.com/1106811" }, { "category": "self", "summary": "SUSE Bug 1107078", "url": "https://bugzilla.suse.com/1107078" }, { "category": "self", "summary": "SUSE Bug 1107665", "url": "https://bugzilla.suse.com/1107665" }, { "category": "self", "summary": "SUSE Bug 1108101", "url": "https://bugzilla.suse.com/1108101" }, { "category": "self", "summary": "SUSE Bug 1110096", "url": "https://bugzilla.suse.com/1110096" }, { "category": "self", "summary": "SUSE Bug 1113042", "url": "https://bugzilla.suse.com/1113042" }, { "category": "self", "summary": "SUSE Bug 1113399", "url": "https://bugzilla.suse.com/1113399" }, { "category": "self", "summary": "SUSE Bug 1113722", "url": "https://bugzilla.suse.com/1113722" }, { "category": "self", "summary": "SUSE Bug 1113939", "url": "https://bugzilla.suse.com/1113939" }, { "category": "self", "summary": "SUSE Bug 1114279", "url": "https://bugzilla.suse.com/1114279" }, { "category": "self", "summary": "SUSE Bug 1114585", "url": "https://bugzilla.suse.com/1114585" }, { "category": "self", "summary": "SUSE Bug 1117108", "url": "https://bugzilla.suse.com/1117108" }, { "category": "self", "summary": "SUSE Bug 1117645", "url": "https://bugzilla.suse.com/1117645" }, { "category": "self", "summary": "SUSE Bug 1119019", "url": "https://bugzilla.suse.com/1119019" }, { "category": "self", "summary": "SUSE Bug 1119086", "url": "https://bugzilla.suse.com/1119086" }, { "category": "self", "summary": "SUSE Bug 1119843", "url": "https://bugzilla.suse.com/1119843" }, { "category": "self", "summary": "SUSE Bug 1120008", "url": "https://bugzilla.suse.com/1120008" }, { "category": "self", "summary": "SUSE Bug 1120601", "url": "https://bugzilla.suse.com/1120601" }, { "category": "self", "summary": "SUSE Bug 1120854", "url": "https://bugzilla.suse.com/1120854" }, { "category": "self", "summary": "SUSE Bug 1120902", "url": "https://bugzilla.suse.com/1120902" }, { "category": "self", "summary": "SUSE Bug 1120909", "url": "https://bugzilla.suse.com/1120909" }, { "category": "self", "summary": "SUSE Bug 1121317", "url": "https://bugzilla.suse.com/1121317" }, { "category": "self", "summary": "SUSE Bug 1121789", "url": "https://bugzilla.suse.com/1121789" }, { "category": "self", "summary": "SUSE Bug 1121805", "url": "https://bugzilla.suse.com/1121805" }, { "category": "self", "summary": "SUSE Bug 1122192", "url": "https://bugzilla.suse.com/1122192" }, { "category": "self", "summary": "SUSE Bug 1122764", "url": "https://bugzilla.suse.com/1122764" }, { "category": "self", "summary": "SUSE Bug 1122822", "url": "https://bugzilla.suse.com/1122822" }, { "category": "self", "summary": "SUSE Bug 1122982", "url": "https://bugzilla.suse.com/1122982" }, { "category": "self", "summary": "SUSE Bug 1123060", "url": "https://bugzilla.suse.com/1123060" }, { "category": "self", "summary": "SUSE Bug 1123061", "url": "https://bugzilla.suse.com/1123061" }, { "category": "self", "summary": "SUSE Bug 1123105", "url": "https://bugzilla.suse.com/1123105" }, { "category": "self", "summary": "SUSE Bug 1123161", "url": "https://bugzilla.suse.com/1123161" }, { "category": "self", "summary": "SUSE Bug 1123456", "url": "https://bugzilla.suse.com/1123456" }, { "category": "self", "summary": "SUSE Bug 1123882", "url": "https://bugzilla.suse.com/1123882" }, { "category": "self", "summary": "SUSE Bug 1124055", "url": "https://bugzilla.suse.com/1124055" }, { "category": "self", "summary": "SUSE Bug 1124235", "url": "https://bugzilla.suse.com/1124235" }, { "category": "self", "summary": "SUSE Bug 1124974", "url": "https://bugzilla.suse.com/1124974" }, { "category": "self", "summary": "SUSE Bug 1124975", "url": "https://bugzilla.suse.com/1124975" }, { "category": "self", "summary": "SUSE Bug 1124976", "url": "https://bugzilla.suse.com/1124976" }, { "category": "self", "summary": "SUSE Bug 1124978", "url": "https://bugzilla.suse.com/1124978" }, { "category": "self", "summary": "SUSE Bug 1124979", "url": "https://bugzilla.suse.com/1124979" }, { "category": "self", "summary": "SUSE Bug 1124980", "url": "https://bugzilla.suse.com/1124980" }, { "category": "self", "summary": "SUSE Bug 1124981", "url": "https://bugzilla.suse.com/1124981" }, { "category": "self", "summary": "SUSE Bug 1124982", "url": "https://bugzilla.suse.com/1124982" }, { "category": "self", "summary": "SUSE Bug 1124984", "url": "https://bugzilla.suse.com/1124984" }, { "category": "self", "summary": "SUSE Bug 1125125", "url": "https://bugzilla.suse.com/1125125" }, { "category": "self", "summary": "SUSE Bug 1125252", "url": "https://bugzilla.suse.com/1125252" }, { "category": "self", "summary": "SUSE Bug 1125315", "url": "https://bugzilla.suse.com/1125315" }, { "category": "self", "summary": "SUSE Bug 1125342", "url": "https://bugzilla.suse.com/1125342" }, { "category": "self", "summary": "SUSE Bug 1125614", "url": "https://bugzilla.suse.com/1125614" }, { "category": "self", "summary": "SUSE Bug 1125728", "url": "https://bugzilla.suse.com/1125728" }, { "category": "self", "summary": "SUSE Bug 1125780", "url": "https://bugzilla.suse.com/1125780" }, { "category": "self", "summary": "SUSE Bug 1125797", "url": "https://bugzilla.suse.com/1125797" }, { "category": "self", "summary": "SUSE Bug 1125799", "url": "https://bugzilla.suse.com/1125799" }, { "category": "self", "summary": "SUSE Bug 1125800", "url": "https://bugzilla.suse.com/1125800" }, { "category": "self", "summary": "SUSE Bug 1125907", "url": "https://bugzilla.suse.com/1125907" }, { "category": "self", "summary": "SUSE Bug 1125947", "url": "https://bugzilla.suse.com/1125947" }, { "category": "self", "summary": "SUSE Bug 1126131", "url": "https://bugzilla.suse.com/1126131" }, { "category": "self", "summary": "SUSE Bug 1126209", "url": "https://bugzilla.suse.com/1126209" }, { "category": "self", "summary": "SUSE Bug 1126356", "url": "https://bugzilla.suse.com/1126356" }, { "category": "self", "summary": "SUSE Bug 1126389", "url": "https://bugzilla.suse.com/1126389" }, { "category": "self", "summary": "SUSE Bug 1126393", "url": "https://bugzilla.suse.com/1126393" }, { "category": "self", "summary": "SUSE Bug 1126476", "url": "https://bugzilla.suse.com/1126476" }, { "category": "self", "summary": "SUSE Bug 1126480", "url": "https://bugzilla.suse.com/1126480" }, { "category": "self", "summary": "SUSE Bug 1126481", "url": "https://bugzilla.suse.com/1126481" }, { "category": "self", "summary": "SUSE Bug 1126488", "url": "https://bugzilla.suse.com/1126488" }, { "category": "self", "summary": "SUSE Bug 1126495", "url": "https://bugzilla.suse.com/1126495" }, { "category": "self", "summary": "SUSE Bug 1126555", "url": "https://bugzilla.suse.com/1126555" }, { "category": "self", "summary": "SUSE Bug 1126579", "url": "https://bugzilla.suse.com/1126579" }, { "category": "self", "summary": "SUSE Bug 1126740", "url": "https://bugzilla.suse.com/1126740" }, { "category": "self", "summary": "SUSE Bug 1126789", "url": "https://bugzilla.suse.com/1126789" }, { "category": "self", "summary": "SUSE Bug 1126790", "url": "https://bugzilla.suse.com/1126790" }, { "category": "self", "summary": "SUSE Bug 1126802", "url": "https://bugzilla.suse.com/1126802" }, { "category": "self", "summary": "SUSE Bug 1126803", "url": "https://bugzilla.suse.com/1126803" }, { "category": "self", "summary": "SUSE Bug 1126804", "url": "https://bugzilla.suse.com/1126804" }, { "category": "self", "summary": "SUSE Bug 1126805", "url": "https://bugzilla.suse.com/1126805" }, { "category": "self", "summary": "SUSE Bug 1126806", "url": "https://bugzilla.suse.com/1126806" }, { "category": "self", "summary": "SUSE Bug 1126807", "url": "https://bugzilla.suse.com/1126807" }, { "category": "self", "summary": "SUSE Bug 1127042", "url": "https://bugzilla.suse.com/1127042" }, { "category": "self", "summary": "SUSE Bug 1127062", "url": "https://bugzilla.suse.com/1127062" }, { "category": "self", "summary": "SUSE Bug 1127082", "url": "https://bugzilla.suse.com/1127082" }, { "category": "self", "summary": "SUSE Bug 1127154", "url": "https://bugzilla.suse.com/1127154" }, { "category": "self", "summary": "SUSE Bug 1127285", "url": "https://bugzilla.suse.com/1127285" }, { "category": "self", "summary": "SUSE Bug 1127286", "url": "https://bugzilla.suse.com/1127286" }, { "category": "self", "summary": "SUSE Bug 1127307", "url": "https://bugzilla.suse.com/1127307" }, { "category": "self", "summary": "SUSE Bug 1127363", "url": "https://bugzilla.suse.com/1127363" }, { "category": "self", "summary": "SUSE Bug 1127378", "url": "https://bugzilla.suse.com/1127378" }, { "category": "self", "summary": "SUSE Bug 1127445", "url": "https://bugzilla.suse.com/1127445" }, { "category": "self", "summary": "SUSE Bug 1127493", "url": "https://bugzilla.suse.com/1127493" }, { "category": "self", "summary": "SUSE Bug 1127494", "url": "https://bugzilla.suse.com/1127494" }, { "category": "self", "summary": "SUSE Bug 1127495", "url": "https://bugzilla.suse.com/1127495" }, { "category": "self", "summary": "SUSE Bug 1127496", "url": "https://bugzilla.suse.com/1127496" }, { "category": "self", "summary": "SUSE Bug 1127497", "url": "https://bugzilla.suse.com/1127497" }, { "category": "self", "summary": "SUSE Bug 1127498", "url": "https://bugzilla.suse.com/1127498" }, { "category": "self", "summary": "SUSE Bug 1127534", "url": "https://bugzilla.suse.com/1127534" }, { "category": "self", "summary": "SUSE Bug 1127561", "url": "https://bugzilla.suse.com/1127561" }, { "category": "self", "summary": "SUSE Bug 1127567", "url": "https://bugzilla.suse.com/1127567" }, { "category": "self", "summary": "SUSE Bug 1127595", "url": "https://bugzilla.suse.com/1127595" }, { "category": "self", "summary": "SUSE Bug 1127603", "url": "https://bugzilla.suse.com/1127603" }, { "category": "self", "summary": "SUSE Bug 1127682", "url": "https://bugzilla.suse.com/1127682" }, { "category": "self", "summary": "SUSE Bug 1127731", "url": "https://bugzilla.suse.com/1127731" }, { "category": "self", "summary": "SUSE Bug 1127750", "url": "https://bugzilla.suse.com/1127750" }, { "category": "self", "summary": "SUSE Bug 1127836", "url": "https://bugzilla.suse.com/1127836" }, { "category": "self", "summary": "SUSE Bug 1127961", "url": "https://bugzilla.suse.com/1127961" }, { "category": "self", "summary": "SUSE Bug 1128094", "url": "https://bugzilla.suse.com/1128094" }, { "category": "self", "summary": "SUSE Bug 1128166", "url": "https://bugzilla.suse.com/1128166" }, { "category": "self", "summary": "SUSE Bug 1128351", "url": "https://bugzilla.suse.com/1128351" }, { "category": "self", "summary": "SUSE Bug 1128451", "url": "https://bugzilla.suse.com/1128451" }, { "category": "self", "summary": "SUSE Bug 1128895", "url": "https://bugzilla.suse.com/1128895" }, { "category": "self", "summary": "SUSE Bug 1129046", "url": "https://bugzilla.suse.com/1129046" }, { "category": "self", "summary": "SUSE Bug 1129080", "url": "https://bugzilla.suse.com/1129080" }, { "category": "self", "summary": "SUSE Bug 1129163", "url": "https://bugzilla.suse.com/1129163" }, { "category": "self", "summary": "SUSE Bug 1129179", "url": "https://bugzilla.suse.com/1129179" }, { "category": "self", "summary": "SUSE Bug 1129181", "url": "https://bugzilla.suse.com/1129181" }, { "category": "self", "summary": "SUSE Bug 1129182", "url": "https://bugzilla.suse.com/1129182" }, { "category": "self", "summary": "SUSE Bug 1129183", "url": "https://bugzilla.suse.com/1129183" }, { "category": "self", "summary": "SUSE Bug 1129184", "url": "https://bugzilla.suse.com/1129184" }, { "category": "self", "summary": "SUSE Bug 1129205", "url": "https://bugzilla.suse.com/1129205" }, { "category": "self", "summary": "SUSE Bug 1129276", "url": "https://bugzilla.suse.com/1129276" }, { "category": "self", "summary": "SUSE Bug 1129281", "url": "https://bugzilla.suse.com/1129281" }, { "category": "self", "summary": "SUSE Bug 1129284", "url": "https://bugzilla.suse.com/1129284" }, { "category": "self", "summary": "SUSE Bug 1129285", "url": "https://bugzilla.suse.com/1129285" }, { "category": "self", "summary": "SUSE Bug 1129291", "url": "https://bugzilla.suse.com/1129291" }, { "category": "self", "summary": "SUSE Bug 1129292", "url": "https://bugzilla.suse.com/1129292" }, { "category": "self", "summary": "SUSE Bug 1129293", "url": "https://bugzilla.suse.com/1129293" }, { "category": "self", "summary": "SUSE Bug 1129294", "url": "https://bugzilla.suse.com/1129294" }, { "category": "self", "summary": "SUSE Bug 1129295", "url": "https://bugzilla.suse.com/1129295" }, { "category": "self", "summary": "SUSE Bug 1129296", "url": "https://bugzilla.suse.com/1129296" }, { "category": "self", "summary": "SUSE Bug 1129326", "url": "https://bugzilla.suse.com/1129326" }, { "category": "self", "summary": "SUSE Bug 1129327", "url": "https://bugzilla.suse.com/1129327" }, { "category": "self", "summary": "SUSE Bug 1129330", "url": "https://bugzilla.suse.com/1129330" }, { "category": "self", "summary": "SUSE Bug 1129363", "url": "https://bugzilla.suse.com/1129363" }, { "category": "self", "summary": "SUSE Bug 1129366", "url": "https://bugzilla.suse.com/1129366" }, { "category": "self", "summary": "SUSE Bug 1129497", "url": "https://bugzilla.suse.com/1129497" }, { "category": "self", "summary": "SUSE Bug 1129519", "url": "https://bugzilla.suse.com/1129519" }, { "category": "self", "summary": "SUSE Bug 1129543", "url": "https://bugzilla.suse.com/1129543" }, { "category": "self", "summary": "SUSE Bug 1129547", "url": "https://bugzilla.suse.com/1129547" }, { "category": "self", "summary": "SUSE Bug 1129551", "url": "https://bugzilla.suse.com/1129551" }, { "category": "self", "summary": "SUSE Bug 1129581", "url": "https://bugzilla.suse.com/1129581" }, { "category": "self", "summary": "SUSE Bug 1129625", "url": "https://bugzilla.suse.com/1129625" }, { "category": "self", "summary": "SUSE Bug 1129664", "url": "https://bugzilla.suse.com/1129664" }, { "category": "self", "summary": "SUSE Bug 1129739", "url": "https://bugzilla.suse.com/1129739" }, { "category": "self", "summary": "SUSE Bug 1129770", "url": "https://bugzilla.suse.com/1129770" }, { "category": "self", "summary": "SUSE Bug 1129923", "url": "https://bugzilla.suse.com/1129923" }, { "category": "self", "summary": "SUSE Bug 1130130", "url": "https://bugzilla.suse.com/1130130" }, { "category": "self", "summary": "SUSE Bug 1130154", "url": "https://bugzilla.suse.com/1130154" }, { "category": "self", "summary": "SUSE Bug 1130335", "url": "https://bugzilla.suse.com/1130335" }, { "category": "self", "summary": "SUSE Bug 1130336", "url": "https://bugzilla.suse.com/1130336" }, { "category": "self", "summary": "SUSE Bug 1130337", "url": "https://bugzilla.suse.com/1130337" }, { "category": "self", "summary": "SUSE Bug 1130338", "url": "https://bugzilla.suse.com/1130338" }, { "category": "self", "summary": "SUSE Bug 1130425", "url": "https://bugzilla.suse.com/1130425" }, { "category": "self", "summary": "SUSE Bug 1130427", "url": "https://bugzilla.suse.com/1130427" }, { "category": "self", "summary": "SUSE Bug 1130518", "url": "https://bugzilla.suse.com/1130518" }, { "category": "self", "summary": "SUSE Bug 1131062", "url": "https://bugzilla.suse.com/1131062" }, { "category": "self", "summary": "SUSE Bug 824948", "url": "https://bugzilla.suse.com/824948" }, { "category": "self", "summary": "SUSE CVE CVE-2019-2024 page", "url": "https://www.suse.com/security/cve/CVE-2019-2024/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-3819 page", "url": "https://www.suse.com/security/cve/CVE-2019-3819/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-7308 page", "url": "https://www.suse.com/security/cve/CVE-2019-7308/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8912 page", "url": "https://www.suse.com/security/cve/CVE-2019-8912/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-8980 page", "url": "https://www.suse.com/security/cve/CVE-2019-8980/" }, { "category": "self", "summary": "SUSE CVE CVE-2019-9213 page", "url": "https://www.suse.com/security/cve/CVE-2019-9213/" } ], "title": "Security update for the Linux Kernel", "tracking": { "current_release_date": "2019-04-12T06:18:34Z", "generator": { "date": "2019-04-12T06:18:34Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2019:1193-1", "initial_release_date": "2019-04-12T06:18:34Z", "revision_history": [ { "date": "2019-04-12T06:18:34Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "kernel-devel-4.12.14-lp150.12.58.1.noarch", "product": { "name": "kernel-devel-4.12.14-lp150.12.58.1.noarch", "product_id": "kernel-devel-4.12.14-lp150.12.58.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-4.12.14-lp150.12.58.1.noarch", "product": { "name": "kernel-docs-4.12.14-lp150.12.58.1.noarch", "product_id": "kernel-docs-4.12.14-lp150.12.58.1.noarch" } }, { "category": "product_version", "name": "kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "product": { "name": "kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "product_id": "kernel-docs-html-4.12.14-lp150.12.58.1.noarch" } }, { "category": "product_version", "name": "kernel-macros-4.12.14-lp150.12.58.1.noarch", "product": { "name": "kernel-macros-4.12.14-lp150.12.58.1.noarch", "product_id": "kernel-macros-4.12.14-lp150.12.58.1.noarch" } }, { "category": "product_version", "name": "kernel-source-4.12.14-lp150.12.58.1.noarch", "product": { "name": "kernel-source-4.12.14-lp150.12.58.1.noarch", "product_id": "kernel-source-4.12.14-lp150.12.58.1.noarch" } }, { "category": "product_version", "name": "kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "product": { "name": "kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "product_id": "kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch" } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-debug-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-debug-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-debug-base-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-default-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-default-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-default-base-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-default-devel-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-obs-build-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-syms-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-syms-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-syms-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-vanilla-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64" } }, { "category": "product_version", "name": "kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64", "product": { "name": "kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64", "product_id": "kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Leap 15.0", "product": { "name": "openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0", "product_identification_helper": { "cpe": "cpe:/o:opensuse:leap:15.0" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-debug-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-base-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-default-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-base-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-default-devel-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-4.12.14-lp150.12.58.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch" }, "product_reference": "kernel-devel-4.12.14-lp150.12.58.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-4.12.14-lp150.12.58.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch" }, "product_reference": "kernel-docs-4.12.14-lp150.12.58.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-docs-html-4.12.14-lp150.12.58.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch" }, "product_reference": "kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-macros-4.12.14-lp150.12.58.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch" }, "product_reference": "kernel-macros-4.12.14-lp150.12.58.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-build-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-4.12.14-lp150.12.58.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch" }, "product_reference": "kernel-source-4.12.14-lp150.12.58.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch" }, "product_reference": "kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-syms-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-syms-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64 as component of openSUSE Leap 15.0", "product_id": "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" }, "product_reference": "kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64", "relates_to_product_reference": "openSUSE Leap 15.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-2024", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-2024" } ], "notes": [ { "category": "general", "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-2024", "url": "https://www.suse.com/security/cve/CVE-2019-2024" }, { "category": "external", "summary": "SUSE Bug 1129179 for CVE-2019-2024", "url": "https://bugzilla.suse.com/1129179" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-12T06:18:34Z", "details": "moderate" } ], "title": "CVE-2019-2024" }, { "cve": "CVE-2019-3819", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-3819" } ], "notes": [ { "category": "general", "text": "A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user (\"root\") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-3819", "url": "https://www.suse.com/security/cve/CVE-2019-3819" }, { "category": "external", "summary": "SUSE Bug 1123161 for CVE-2019-3819", "url": "https://bugzilla.suse.com/1123161" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-12T06:18:34Z", "details": "moderate" } ], "title": "CVE-2019-3819" }, { "cve": "CVE-2019-7308", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-7308" } ], "notes": [ { "category": "general", "text": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-7308", "url": "https://www.suse.com/security/cve/CVE-2019-7308" }, { "category": "external", "summary": "SUSE Bug 1124055 for CVE-2019-7308", "url": "https://bugzilla.suse.com/1124055" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-12T06:18:34Z", "details": "important" } ], "title": "CVE-2019-7308" }, { "cve": "CVE-2019-8912", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8912" } ], "notes": [ { "category": "general", "text": "In the Linux kernel through 4.20.11, af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8912", "url": "https://www.suse.com/security/cve/CVE-2019-8912" }, { "category": "external", "summary": "SUSE Bug 1125907 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1125907" }, { "category": "external", "summary": "SUSE Bug 1126284 for CVE-2019-8912", "url": "https://bugzilla.suse.com/1126284" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-12T06:18:34Z", "details": "moderate" } ], "title": "CVE-2019-8912" }, { "cve": "CVE-2019-8980", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-8980" } ], "notes": [ { "category": "general", "text": "A memory leak in the kernel_read_file function in fs/exec.c in the Linux kernel through 4.20.11 allows attackers to cause a denial of service (memory consumption) by triggering vfs_read failures.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-8980", "url": "https://www.suse.com/security/cve/CVE-2019-8980" }, { "category": "external", "summary": "SUSE Bug 1126209 for CVE-2019-8980", "url": "https://bugzilla.suse.com/1126209" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-12T06:18:34Z", "details": "low" } ], "title": "CVE-2019-8980" }, { "cve": "CVE-2019-9213", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2019-9213" } ], "notes": [ { "category": "general", "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2019-9213", "url": "https://www.suse.com/security/cve/CVE-2019-9213" }, { "category": "external", "summary": "SUSE Bug 1128166 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128166" }, { "category": "external", "summary": "SUSE Bug 1128378 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1128378" }, { "category": "external", "summary": "SUSE Bug 1129016 for CVE-2019-9213", "url": "https://bugzilla.suse.com/1129016" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "openSUSE Leap 15.0:kernel-debug-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-debug-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-default-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-devel-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-docs-html-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-kvmsmall-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-kvmsmall-devel-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-macros-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-obs-build-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-obs-qa-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-source-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-source-vanilla-4.12.14-lp150.12.58.1.noarch", "openSUSE Leap 15.0:kernel-syms-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-base-4.12.14-lp150.12.58.1.x86_64", "openSUSE Leap 15.0:kernel-vanilla-devel-4.12.14-lp150.12.58.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2019-04-12T06:18:34Z", "details": "moderate" } ], "title": "CVE-2019-9213" } ] }
ghsa-vww8-62hf-x3fx
Vulnerability from github
kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.
{ "affected": [], "aliases": [ "CVE-2019-7308" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2019-02-01T22:29:00Z", "severity": "MODERATE" }, "details": "kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.", "id": "GHSA-vww8-62hf-x3fx", "modified": "2022-05-13T01:54:08Z", "published": "2022-05-13T01:54:08Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-7308" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "type": "WEB", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1711" }, { "type": "WEB", "url": "https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K43030517" }, { "type": "WEB", "url": "https://support.f5.com/csp/article/K43030517?utm_source=f5support\u0026amp;utm_medium=RSS" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3930-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3930-2" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3931-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3931-2" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38" }, { "type": "WEB", "url": "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00052.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/106827" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.